diff --git a/CVE-2020/CVE-2020-241xx/CVE-2020-24198.json b/CVE-2020/CVE-2020-241xx/CVE-2020-24198.json index 50d3ee64dc0..b096c0c21db 100644 --- a/CVE-2020/CVE-2020-241xx/CVE-2020-24198.json +++ b/CVE-2020/CVE-2020-241xx/CVE-2020-24198.json @@ -2,13 +2,13 @@ "id": "CVE-2020-24198", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-09T15:15:10.660", - "lastModified": "2020-09-15T16:52:29.257", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:15:12.033", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.'" + "value": "A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.' NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network." }, { "lang": "es", @@ -102,6 +102,10 @@ "Third Party Advisory" ] }, + { + "url": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918", + "source": "cve@mitre.org" + }, { "url": "https://www.sourcecodester.com/php/14366/stock-management-system-php.html", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46808.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46808.json index 1676140156d..52a23b282e6 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46808.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46808.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46808", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T13:15:08.310", - "lastModified": "2023-11-09T19:17:06.370", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:02.103", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46818.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46818.json index 47e6375a177..7cea05235d8 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46818.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46818.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46818", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T16:15:30.930", - "lastModified": "2023-11-13T17:46:37.237", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:02.377", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46859.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46859.json index c78545e6657..ec97646e36e 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46859.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46859.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46859", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T13:15:08.373", - "lastModified": "2023-11-09T19:16:38.763", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:02.683", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47426.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47426.json index 9e4623fe643..5fefd12d145 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47426.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47426.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47426", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T13:15:08.437", - "lastModified": "2023-11-09T19:15:51.560", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:02.953", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47445.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47445.json index 84c7234e415..0f2f6b67fc3 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47445.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47445.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47445", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T13:15:08.503", - "lastModified": "2023-11-09T19:12:35.517", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T18:35:01.370", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48826.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48826.json index e72548055be..c4c854ed762 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48826.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48826.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48826", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T12:15:06.347", - "lastModified": "2024-07-16T13:43:58.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T19:36:26.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vc4: se corrige el punto muerto en el error de conexi\u00f3n del dispositivo DSI. La conexi\u00f3n del dispositivo DSI al host DSI se realizar\u00e1 con el bloqueo del dispositivo host retenido. Cancelar el registro del host en la ruta de error \"conexi\u00f3n de dispositivo\" (por ejemplo, reintento de sonda) resultar\u00e1 en un punto muerto con un seguimiento de llamada inferior y una pantalla DSI no operativa. Seguimiento de llamadas de inicio: [35.043036] rt_mutex_slowlock.constprop.21+0x184/0x1b8 [35.043048] mutex_lock_nested+0x7c/0xc8 [35.043060] device_del+0x4c/0x3e8 [35.043075 dispositivo_unregister+0x20/ 0x40 [35.043082] mipi_dsi_remove_device_fn+0x18/0x28 [35.043093 ] dispositivo_para_cada_ni\u00f1o+0x68/0xb0 [ 35.043105] mipi_dsi_host_unregister+0x40/0x90 [ 35.043115] vc4_dsi_host_attach+0xf0/0x120 [vc4] [ 35.043199] mipi_dsi_attach+0x30/0x48 [ 35.043209] tc358762_probe+0x128/0x164 [tc358762] [ 35.043225] mipi_dsi_drv_probe+0x28 /0x38 [ 35.043234] very_probe+0xc0/0x318 [ 35.043244] __driver_probe_device+0x80/0xe8 [ 35.043254] driver_probe_device+0xb8/0x118 [ 35.043263] xe8 [ 35.043273] bus_for_each_drv+0x84/0xd8 [ 35.043281] __device_attach+0xf0/0x150 [ 35.043290] dispositivo_inicial_probe+0x1c/0x28 [ 35.043300] bus_probe_device+0xa4/0xb0 [ 35.043308] diferido_probe_work_func+0xa0/0xe0 [ 35.043318] proceso_one_work+0x254/0x700 [ 35.0 43330] hilo_trabajador+0x4c/0x448 [ 35.043339] kthread+0x19c/0x1a8 [ 35.043348 ] ret_from_fork+0x10/0x20 Apagado Rastreo de llamadas: [ 365.565417] Rastreo de llamadas: [ 365.565423] __switch_to+0x148/0x200 [ 365.565452] __schedule+0x340/0x9c8 [ 365.565467] 0x110 [365.565479] timeout_programado+0x3b0/0x448 [365.565496 ] wait_for_completion+0xac/0x138 [ 365.565509] __flush_work+0x218/0x4e0 [ 365.565523] flush_work+0x1c/0x28 [ 365.565536] wait_for_device_probe+0x68/0x158 [ 365.565550] _shutdown+0x24/0x348 [ 365.565561] kernel_restart_prepare+0x40/0x50 [ 365.565578] kernel_restart +0x20/0x70 [ 365.565591] __do_sys_reboot+0x10c/0x220 [ 365.565605] __arm64_sys_reboot+0x2c/0x38 [ 365.565619] invoke_syscall+0x4c/0x110 [ 365.56563 4] el0_svc_common.constprop.3+0xfc/0x120 [ 365.565648] do_el0_svc+0x2c/0x90 [ 365.565661 ] el0_svc+0x4c/0xf0 [ 365.565671] el0t_64_sync_handler+0x90/0xb8 [ 365.565682] el0t_64_sync+0x180/0x184" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.24", + "matchCriteriaId": "9064E0A6-C05B-4161-9FB1-A2CC0F00A07A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.10", + "matchCriteriaId": "679523BA-1392-404B-AB85-F5A5408B1ECC" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a3d12ab5097b1d045e693412e6b366b7e82031b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/770d1ba9a8201ce9bee0946eb03746449b6f3b80", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dddd832f35096fbc5004e3a7e58fb4d2cefb8deb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25700.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25700.json index f902f57eaa4..3293145ee27 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25700.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25700.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25700", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T17:15:08.413", - "lastModified": "2023-11-13T19:52:51.423", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:03.447", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25800.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25800.json index 2983d258e8a..4331757fa2d 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25800.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25800.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25800", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T17:15:08.487", - "lastModified": "2023-11-14T13:57:41.837", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:03.697", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25990.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25990.json index a2073ffd79c..d003c63c36b 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25990.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25990.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25990", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T17:15:08.553", - "lastModified": "2023-11-13T19:43:16.177", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:03.957", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32508.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32508.json index d0c31a49a0f..e885b087867 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32508.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32508.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32508", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T17:15:08.693", - "lastModified": "2023-11-13T19:46:18.337", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:04.203", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34179.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34179.json index 07300ea6939..1c0867b9d9e 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34179.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34179.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34179", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T17:15:08.760", - "lastModified": "2023-11-13T19:51:47.503", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:04.667", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37243.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37243.json index 489a5fd0bbd..6d8495c2acf 100644 --- a/CVE-2023/CVE-2023-372xx/CVE-2023-37243.json +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37243.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37243", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-10-31T15:15:08.993", - "lastModified": "2023-11-08T18:48:53.687", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T18:35:01.950", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,6 +79,16 @@ "value": "CWE-379" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-379" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40215.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40215.json index 16786e4266e..c8f767c264d 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40215.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40215.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40215", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-04T00:15:08.797", - "lastModified": "2023-11-09T20:07:44.523", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:05.073", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46361.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46361.json index ab4e0364689..b74c109942b 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46361.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46361.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46361", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-31T06:15:08.900", - "lastModified": "2023-11-06T19:26:57.803", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T19:35:05.973", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51888.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51888.json index 8c660d3ab37..6b0528afe18 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51888.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51888.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51888", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-24T18:15:08.240", - "lastModified": "2024-02-05T14:11:51.323", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T18:35:05.327", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6503.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6503.json index 5daaae453d1..288a35e9f2f 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6503.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6503.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6503", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-29T15:15:09.587", - "lastModified": "2024-02-03T00:27:48.957", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T18:35:06.590", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28077.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28077.json index 31b54222a96..81f693ca2ab 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28077.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28077.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28077", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T20:15:07.733", - "lastModified": "2024-08-27T13:02:05.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:29:31.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,544 @@ "value": "Se descubri\u00f3 un problema de denegaci\u00f3n de servicio en ciertos dispositivos GL-iNet. Algunos sitios web pueden detectar dispositivos expuestos a la red externa a trav\u00e9s de DDNS y, en consecuencia, obtener las direcciones IP y los puertos de los dispositivos que est\u00e1n expuestos. Al utilizar nombres de usuario especiales y caracteres especiales (como medio par\u00e9ntesis o corchetes), se puede llamar a la interfaz de inicio de sesi\u00f3n y provocar que el programa de administraci\u00f3n de sesiones falle, lo que provocar\u00e1 que los clientes no puedan iniciar sesi\u00f3n en sus dispositivos. Esto afecta a MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10 y XE300 4 .3. 16." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1C6413-DB3D-4B14-9246-38AA5103615D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "861A5EB1-2DFF-479C-9202-590DB6E796C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FB3DD919-EC2B-44CF-AEBD-4EA5A0D52552" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CD782342-ED71-4BD6-97EB-330F14991957" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5AE60C1C-957D-472A-BB66-21DA80B97099" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AED7B3A1-7DEB-4DB0-AA6E-7D27434BD2CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9C4B6800-8A1B-4522-B5E0-9CC4C09DBA2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "79D3F6BA-60D2-495A-8C74-7E74D3DB25A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "0CB74B0F-E141-403A-B480-5B48B9040D4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "9AE590D9-C0AB-4E3E-8E03-DBF12445AA0B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "E53CE790-1466-4BB0-933B-33B531C0DD55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "83E73FCD-31F7-4BE9-8D16-FB4FDAC685BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "993B06A2-2BB4-4EBC-904E-802001D9DFEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AD8F61AA-DE3B-44DC-AE73-7D8E807F918E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1EDB92-F871-4F92-B5CB-9DE24A908D8C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "CE0558E6-FAC8-4569-9AA4-C96823E591C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BB0698-5585-4511-88EA-7C265EF22F10" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Denial%20of%20service.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gl-inet.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34637.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34637.json index a6ecc0b9044..5e0ec007147 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34637.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34637.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34637", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:11.377", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:05:27.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,67 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr_sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE6DDF76-7C22-4AE7-A84E-431807413952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34638.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34638.json index fa88bf8bc32..5e1a5c121f8 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34638.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34638.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34638", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:11.767", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:05:03.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,237 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34639.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34639.json index 4238c886898..173cdf5422d 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34639.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34639.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34639", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:11.997", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:04:37.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,237 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=08", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34640.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34640.json index 750b5216212..98ef426a515 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34640.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34640.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34640", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:12.217", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:04:28.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,237 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34642.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34642.json index 2f3516a30a5..4041a88b027 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34642.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34642.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34642", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:12.730", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:03:57.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,562 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34643.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34643.json index 64ccef40a91..f8b146409e8 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34643.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34643", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:12.970", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:03:12.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,212 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34644.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34644.json index 9bd39ca98dc..be5f53c44c8 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34644.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34644.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34644", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:13.173", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:03:00.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,212 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34645.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34645.json index 76714f123f6..e3be65da164 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34645.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34645.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34645", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:13.400", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:02:05.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,387 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34646.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34646.json index 1819977748b..1d67c096ad8 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34646.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34646.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34646", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:13.647", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:01:31.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,562 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34647.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34647.json index 310d20b54c3..033fe58d1e9 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34647.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34647.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34647", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:13.890", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:00:35.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,562 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34648.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34648.json index d94d9a95084..ca11472f0f7 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34648.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34648.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34648", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:14.113", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:04:43.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,562 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34649.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34649.json index c8e39276c88..b7ddc74636f 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34649.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34649.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34649", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:14.347", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:59:55.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,212 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34653.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34653.json index 426d41c44a4..75dbc9554fe 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34653.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34653", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:15.267", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:04:40.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,562 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34654.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34654.json index dce6d54347d..cece63f78ba 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34654.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34654", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:15.520", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:00:07.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,387 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34655.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34655.json index d91c1809dfe..7fccaab2753 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34655.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34655.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34655", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:15.710", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:00:39.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,562 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37136.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37136.json index d5d700ce1c0..7d22270e969 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37136.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37136.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37136", "sourceIdentifier": "security_alert@emc.com", "published": "2024-09-03T06:15:14.413", - "lastModified": "2024-09-04T14:59:32.320", + "lastModified": "2024-09-05T19:01:28.123", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security_alert@emc.com", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37549.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37549.json index 5ea529d076c..764b599f4b7 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37549.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37549.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37549", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-21T07:15:03.807", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:56:30.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.1", + "matchCriteriaId": "F3AB0C1D-BAA0-4777-A1F0-A570D43DF613" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/save-as-pdf-by-pdfcrowd/wordpress-save-as-pdf-plugin-by-pdfcrowd-plugin-3-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37551.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37551.json index 81d13bbdcc9..f730ec71b8b 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37551.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37551", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-21T07:15:04.270", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:57:45.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perials:simple_social_share:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.0", + "matchCriteriaId": "026F02AA-DAE7-40C1-8942-FDB844A8C39F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/simple-social-share/wordpress-simple-social-share-plugin-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37552.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37552.json index c5ce4f47231..4a010b7423d 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37552.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37552", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-21T07:15:04.497", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T19:02:08.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inisev:social_media_share_buttons_\\&_social_sharing_icons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.9.2", + "matchCriteriaId": "A153A64A-0181-41F7-AEBD-9021A56BA564" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ultimate-social-media-icons/wordpress-social-media-share-buttons-social-sharing-icons-plugin-2-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37556.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37556.json index 6d6e8bec65d..de68dacce07 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37556.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37556", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-21T07:15:04.720", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T19:40:19.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seedprod:wordpress_notification_bar:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.10", + "matchCriteriaId": "A49B7170-5C5A-4D87-A00A-29371D76883D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wordpress-notification-bar/wordpress-wordpress-notification-bar-plugin-1-3-10-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37557.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37557.json index 9a74b4007ba..8eb34c5129a 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37557.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37557.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37557", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-21T07:15:04.950", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T19:41:26.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sohamsolution:wp_cookie_law_info:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "46225AC9-A1F2-49AF-8959-F5B2CAC7F8C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-cookie-law-info/wordpress-wp-cookie-law-info-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37558.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37558.json index fc1ffb16b45..d28dd0f9f35 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37558.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37558.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37558", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-21T07:15:05.190", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T19:47:47.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nihal:wpfavicon:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.1", + "matchCriteriaId": "3642B9C6-2286-48BB-B748-BDD9E5B750F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpfavicon/wordpress-wpfavicon-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41444.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41444.json index d560a2f35db..37f79ec2533 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41444.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41444.json @@ -2,17 +2,41 @@ "id": "CVE-2024-41444", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T17:15:06.657", - "lastModified": "2024-08-26T19:10:09.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:36:39.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SeaCMS v12.9 has a SQL injection vulnerability in the key parameter of /js/player/dmplayer/dmku/index.php?ac=so." + }, + { + "lang": "es", + "value": "SeaCMS v12.9 tiene una vulnerabilidad de inyecci\u00f3n SQL en el par\u00e1metro clave de /js/player/dmplayer/dmku/index.php?ac=so." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,18 +81,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/looppppp/fa328c81ce19c1097d10f95c763d0d50", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/seacms-net/CMS", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.seacms.net/p-549", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41879.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41879.json index fea8af22fcb..b1e4e47a2c3 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41879.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41879.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41879", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-26T12:15:05.640", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T19:58:35.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Acrobat Reader versions 127.0.2651.105 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 127.0.2651.105 y anteriores de Acrobat Reader se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { @@ -47,10 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4B0A92A-0417-4BE5-A4F8-E9C705CF12DA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0.2739.42", + "matchCriteriaId": "5B3C4915-21C5-4DB1-8791-EB3AEB04A654" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41879", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42491.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42491.json new file mode 100644 index 00000000000..cc4fd5e727f --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42491.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2024-42491", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-05T18:15:05.707", + "lastModified": "2024-09-05T18:15:05.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42790.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42790.json index 92e090d9b59..61815a2bafd 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42790.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42790", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T17:15:06.757", - "lastModified": "2024-08-27T14:35:06.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T18:36:04.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Reflected%20XSS%20-%20index.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42792.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42792.json index e5bbeea2c35..75a5bb80006 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42792.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42792.json @@ -2,17 +2,41 @@ "id": "CVE-2024-42792", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T17:15:06.813", - "lastModified": "2024-08-26T19:10:09.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:35:24.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Music Management System v1.0 via /music/ajax.php?action=delete_playlist page." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross-Site Request Forgery (CSRF) en Kashipara Music Management System v1.0 a trav\u00e9s de la p\u00e1gina /music/ajax.php?action=delete_playlist." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/CSRF%20-%20Delete%20Playlist.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42885.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42885.json index 69d1b233569..cf88aa01916 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42885.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42885.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42885", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T16:15:07.720", - "lastModified": "2024-09-05T17:44:56.007", + "lastModified": "2024-09-05T18:35:07.060", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SQL Injection vulnerability in ESAFENET CDG 5.6 and before allows an attacker to execute arbitrary code via the id parameter of the data.jsp page." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://supervisor0.notion.site/ESAFENET-CDG-SQL-Injection-17d7e244810147f697c3c42a884f932b", diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42906.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42906.json index 91c0375fa13..f2a53447242 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42906.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42906.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42906", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T20:15:07.913", - "lastModified": "2024-08-27T13:02:05.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:29:02.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:testlink:testlink:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9.20", + "matchCriteriaId": "01DE0887-8E55-4C10-BAE0-01330A770DA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-42906.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://testlink.org/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42913.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42913.json index 00d33a7c8a5..c6ab05f7b60 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42913.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42913", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T18:15:07.283", - "lastModified": "2024-08-28T20:15:07.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T18:31:19.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Se descubri\u00f3 que RuoYi CMS v4.7.9 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro job_id en /sasfs1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruoyi:ruoyi:4.7.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE442B0A-AFDF-43FE-BB81-57EE7ACE1F18" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kkll5875", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43887.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43887.json index a7a745f63bf..0e2ee8e4f95 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43887.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43887.json @@ -2,24 +2,98 @@ "id": "CVE-2024-43887", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:03.877", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T19:43:44.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tcp: Disable TCP-AO static key after RCU grace period\n\nThe lifetime of TCP-AO static_key is the same as the last\ntcp_ao_info. On the socket destruction tcp_ao_info ceases to be\nwith RCU grace period, while tcp-ao static branch is currently deferred\ndestructed. The static key definition is\n: DEFINE_STATIC_KEY_DEFERRED_FALSE(tcp_ao_needed, HZ);\n\nwhich means that if RCU grace period is delayed by more than a second\nand tcp_ao_needed is in the process of disablement, other CPUs may\nyet see tcp_ao_info which atent dead, but soon-to-be.\nAnd that breaks the assumption of static_key_fast_inc_not_disabled().\n\nSee the comment near the definition:\n> * The caller must make sure that the static key can't get disabled while\n> * in this function. It doesn't patch jump labels, only adds a user to\n> * an already enabled static key.\n\nOriginally it was introduced in commit eb8c507296f6 (\"jump_label:\nPrevent key->enabled int overflow\"), which is needed for the atomic\ncontexts, one of which would be the creation of a full socket from a\nrequest socket. In that atomic context, it's known by the presence\nof the key (md5/ao) that the static branch is already enabled.\nSo, the ref counter for that static branch is just incremented\ninstead of holding the proper mutex.\nstatic_key_fast_inc_not_disabled() is just a helper for such usage\ncase. But it must not be used if the static branch could get disabled\nin parallel as it's not protected by jump_label_mutex and as a result,\nraces with jump_label_update() implementation details.\n\nHappened on netdev test-bot[1], so not a theoretical issue:\n\n[] jump_label: Fatal kernel bug, unexpected op at tcp_inbound_hash+0x1a7/0x870 [ffffffffa8c4e9b7] (eb 50 0f 1f 44 != 66 90 0f 1f 00)) size:2 type:1\n[] ------------[ cut here ]------------\n[] kernel BUG at arch/x86/kernel/jump_label.c:73!\n[] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[] CPU: 3 PID: 243 Comm: kworker/3:3 Not tainted 6.10.0-virtme #1\n[] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[] Workqueue: events jump_label_update_timeout\n[] RIP: 0010:__jump_label_patch+0x2f6/0x350\n...\n[] Call Trace:\n[] \n[] arch_jump_label_transform_queue+0x6c/0x110\n[] __jump_label_update+0xef/0x350\n[] __static_key_slow_dec_cpuslocked.part.0+0x3c/0x60\n[] jump_label_update_timeout+0x2c/0x40\n[] process_one_work+0xe3b/0x1670\n[] worker_thread+0x587/0xce0\n[] kthread+0x28a/0x350\n[] ret_from_fork+0x31/0x70\n[] ret_from_fork_asm+0x1a/0x30\n[] \n[] Modules linked in: veth\n[] ---[ end trace 0000000000000000 ]---\n[] RIP: 0010:__jump_label_patch+0x2f6/0x350\n\n[1]: https://netdev-3.bots.linux.dev/vmksft-tcp-ao-dbg/results/696681/5-connect-deny-ipv6/stderr" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/tcp: deshabilite la clave est\u00e1tica TCP-AO despu\u00e9s del per\u00edodo de gracia de RCU. La vida \u00fatil de TCP-AO static_key es la misma que la del \u00faltimo tcp_ao_info. En la destrucci\u00f3n del socket, tcp_ao_info deja de tener un per\u00edodo de gracia de RCU, mientras que la rama est\u00e1tica tcp-ao actualmente se retrasa su destrucci\u00f3n. La definici\u00f3n de clave est\u00e1tica es: DEFINE_STATIC_KEY_DEFERRED_FALSE(tcp_ao_needed, HZ); lo que significa que si el per\u00edodo de gracia de la RCU se retrasa m\u00e1s de un segundo y tcp_ao_needed est\u00e1 en proceso de deshabilitaci\u00f3n, es posible que otras CPU a\u00fan vean tcp_ao_info, que est\u00e1 muerto, pero pronto lo estar\u00e1. Y eso rompe la suposici\u00f3n de static_key_fast_inc_not_disabled(). Vea el comentario cerca de la definici\u00f3n: > * El que llama debe asegurarse de que la clave est\u00e1tica no puede conseguir desactivada mientras > * est\u00e1 en esta funci\u00f3n. No parchea etiquetas de salto, s\u00f3lo agrega un usuario a > * una clave est\u00e1tica ya habilitada. Originalmente se introdujo en el commit eb8c507296f6 (\"jump_label: Prevent key->enabled int overflow\"), que es necesaria para los contextos at\u00f3micos, uno de los cuales ser\u00eda la creaci\u00f3n de un socket completo a partir de un socket de solicitud. En ese contexto at\u00f3mico, se sabe por la presencia de la clave (md5/ao) que la rama est\u00e1tica ya est\u00e1 habilitada. Entonces, el contador de referencia para esa rama est\u00e1tica simplemente se incrementa en lugar de mantener el mutex adecuado. static_key_fast_inc_not_disabled() es solo una ayuda para tal caso de uso. Pero no debe usarse si la rama est\u00e1tica podr\u00eda deshabilitarse en paralelo ya que no est\u00e1 protegida por jump_label_mutex y, como resultado, corre con los detalles de implementaci\u00f3n de jump_label_update(). Sucedi\u00f3 en netdev test-bot[1], por lo que no es un problema te\u00f3rico: [] jump_label: error fatal del kernel, operaci\u00f3n inesperada en tcp_inbound_hash+0x1a7/0x870 [ffffffffa8c4e9b7] (eb 50 0f 1f 44 != 66 90 0f 1f 00)) tama\u00f1o:2 tipo:1 [] ------------[ cortar aqu\u00ed ]------------ [] ERROR del kernel en arch/x86/kernel/jump_label.c :73! [] Ups: c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP KASAN NOPTI [] CPU: 3 PID: 243 Comm: kworker/3:3 Not tainted 6.10.0-virtme #1 [] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 01/04/2014 [] Cola de trabajo: eventos jump_label_update_timeout [] RIP: 0010:__jump_label_patch+0x2f6/0x350... [] Llamada Seguimiento: [] [] arch_jump_label_transform_queue+0x6c/0x110 [] __jump_label_update+0xef/0x350 [] __static_key_slow_dec_cpuslocked.part.0+0x3c/0x60 [] jump_label_update_timeout+0x2c/0x40 [] 0x1670 [] hilo_trabajador+ 0x587/0xce0 [] kthread+0x28a/0x350 [] ret_from_fork+0x31/0x70 [] ret_from_fork_asm+0x1a/0x30 [] [] M\u00f3dulos vinculados en: veth [] ---[ end trace 0000000000000000 ]--- [] RIP: 0010:__jump_label_patch+0x2f6/0x350 [1]: https://netdev-3.bots.linux.dev/vmksft-tcp-ao-dbg/results/696681/5-connect-deny-ipv6/stderr" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/14ab4792ee120c022f276a7e4768f4dcb08f0cdd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/954d55a59b2501f4a9bd693b40ce45a1c46cb2b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43890.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43890.json index 1f9de89ca88..2db6b15589f 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43890.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43890.json @@ -2,48 +2,182 @@ "id": "CVE-2024-43890", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:04.040", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:48:30.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix overflow in get_free_elt()\n\n\"tracing_map->next_elt\" in get_free_elt() is at risk of overflowing.\n\nOnce it overflows, new elements can still be inserted into the tracing_map\neven though the maximum number of elements (`max_elts`) has been reached.\nContinuing to insert elements after the overflow could result in the\ntracing_map containing \"tracing_map->max_size\" elements, leaving no empty\nentries.\nIf any attempt is made to insert an element into a full tracing_map using\n`__tracing_map_insert()`, it will cause an infinite loop with preemption\ndisabled, leading to a CPU hang problem.\n\nFix this by preventing any further increments to \"tracing_map->next_elt\"\nonce it reaches \"tracing_map->max_elt\"." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rastreo: corrige el desbordamiento en get_free_elt() \"tracing_map->next_elt\" en get_free_elt() corre el riesgo de desbordarse. Una vez que se desborda, a\u00fan se pueden insertar nuevos elementos en tracing_map aunque se haya alcanzado el n\u00famero m\u00e1ximo de elementos (`max_elts`). Continuar insertando elementos despu\u00e9s del desbordamiento podr\u00eda dar como resultado que tracing_map contenga elementos \"tracing_map->max_size\", sin dejar entradas vac\u00edas. Si se intenta insertar un elemento en un tracing_map completo usando `__tracing_map_insert()`, se producir\u00e1 un bucle infinito con la preferencia deshabilitada, lo que provocar\u00e1 un problema de bloqueo de la CPU. Solucione este problema evitando incrementos adicionales en \"tracing_map->next_elt\" una vez que llegue a \"tracing_map->max_elt\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7", + "versionEndExcluding": "4.19.320", + "matchCriteriaId": "A5445A05-438F-486B-AA08-94074DAF4196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.105", + "matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/236bb4690773ab6869b40bedc7bc8d889e36f9d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/302ceb625d7b990db205a15e371f9a71238de91c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/788ea62499b3c18541fd6d621964d8fafbc4aec5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a172c7b22bc2feaf489cfc6d6865f7237134fdf8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcf86c01ca4676316557dd482c8416ece8c2e143", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd10d186a5409a1fe6e976df82858e9773a698da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3e4dbc2858fe85d1dbd2e72a9fc5dea988b5c18", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb223bf01e688dfe37e813c8988ee11c8c9f8d0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43891.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43891.json index edbb9c22cd1..4d10593b387 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43891.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43891", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:04.103", - "lastModified": "2024-09-04T12:15:05.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T18:46:18.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,99 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rastreo: Tener formato de archivo honor\u00edfico EVENT_FILE_FL_FREED Cuando se introdujo eventfs, se tuvo que tener especial cuidado para coordinar la liberaci\u00f3n de los metadatos del archivo con los archivos que est\u00e1n expuestos al espacio del usuario. Los metadatos del archivo tendr\u00edan un recuento de referencias que se establece cuando se crea el archivo y se reducir\u00edan y liberar\u00edan despu\u00e9s de que el \u00faltimo usuario que abri\u00f3 el archivo lo cerr\u00f3. Cuando se iban a liberar los metadatos del archivo, se establecer\u00eda un indicador (EVENT_FILE_FL_FREED) para indicar que el archivo est\u00e1 liberado, y cualquier nueva referencia realizada (como nuevas aperturas o lecturas) fallar\u00eda ya que se marca como liberado. Esto permiti\u00f3 liberar otros metadatos despu\u00e9s de establecer este indicador (bajo event_mutex). Todos los archivos que se crearon din\u00e1micamente en el directorio de eventos ten\u00edan un puntero a los metadatos del archivo y llamar\u00edan a event_release() cuando se cerrara la \u00faltima referencia al archivo de espacio de usuario. Este ser\u00eda el momento en el que ser\u00e1 seguro liberar los metadatos del archivo. Se cre\u00f3 un acceso directo para el archivo \"formato\". Es i_private apuntar\u00eda a la entrada \"llamar\" directamente y no a los metadatos del archivo. Esto se debe a que todos los archivos de formato son iguales para una misma \"llamada\", por lo que se pens\u00f3 que no hab\u00eda motivo para diferenciarlos. Los otros archivos mantienen el estado (como \"habilitar\", \"activar\", etc.). Pero esto significaba que si el archivo desapareciera, el archivo \"formateado\" no lo sabr\u00eda. Esto provoc\u00f3 una ejecuci\u00f3n que podr\u00eda desencadenarse a trav\u00e9s de la prueba user_events (que crear\u00eda eventos din\u00e1micos y los liberar\u00eda) y ejecutar un bucle que leer\u00eda los archivos de formato user_events: En una ejecuci\u00f3n de consola: # cd tools/testing/selftests/user_events # si bien es cierto; hacer ./ftrace_test; hecho Y en otra consola ejecute: # cd /sys/kernel/tracing/ # while true; hacer eventos de gato/eventos_usuario/__test_event/formato; done 2>/dev/null Con la comprobaci\u00f3n de memoria de KASAN, se activar\u00eda un informe de error de use-after-free (que era un error real). Esto se deb\u00eda a que el archivo de formato no estaba verificando el indicador de metadatos del archivo \"EVENT_FILE_FL_FREED\", por lo que acceder\u00eda al evento al que apuntaban los metadatos del archivo despu\u00e9s de que se liberara el evento. Despu\u00e9s de la inspecci\u00f3n, se encontr\u00f3 que hay otras ubicaciones que no marcaban el indicador EVENT_FILE_FL_FREED al acceder a trace_event_file. Agregue una nueva funci\u00f3n auxiliar: event_file_file() que garantizar\u00e1 que event_mutex se mantenga y devolver\u00e1 NULL si trace_event_file tiene establecido el indicador EVENT_FILE_FL_FREED. Haga que la primera referencia del puntero del archivo de estructura use event_file_file() y verifique NULL. Los usos posteriores a\u00fan pueden usar la funci\u00f3n auxiliar event_file_data() si event_mutex a\u00fan se mantiene y no se liber\u00f3 desde la llamada event_file_file()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.33", + "versionEndExcluding": "6.6.49", + "matchCriteriaId": "EF5E99A7-E570-41C0-81D1-35491C9A68B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "F07BD0FF-07AF-4DAD-8EB1-09FB50ABDC47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4ed03758ddf0b19d69eed69386d65a92d0091e0c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/531dc6780d94245af037c25c2371c8caf652f0f9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b1560408692cd0ab0370cfbe9deb03ce97ab3f6d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43892.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43892.json index 17a98babe30..e3bc50e93d0 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43892.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43892.json @@ -2,28 +2,112 @@ "id": "CVE-2024-43892", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:04.157", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:41:38.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemcg: protect concurrent access to mem_cgroup_idr\n\nCommit 73f576c04b94 (\"mm: memcontrol: fix cgroup creation failure after\nmany small jobs\") decoupled the memcg IDs from the CSS ID space to fix the\ncgroup creation failures. It introduced IDR to maintain the memcg ID\nspace. The IDR depends on external synchronization mechanisms for\nmodifications. For the mem_cgroup_idr, the idr_alloc() and idr_replace()\nhappen within css callback and thus are protected through cgroup_mutex\nfrom concurrent modifications. However idr_remove() for mem_cgroup_idr\nwas not protected against concurrency and can be run concurrently for\ndifferent memcgs when they hit their refcnt to zero. Fix that.\n\nWe have been seeing list_lru based kernel crashes at a low frequency in\nour fleet for a long time. These crashes were in different part of\nlist_lru code including list_lru_add(), list_lru_del() and reparenting\ncode. Upon further inspection, it looked like for a given object (dentry\nand inode), the super_block's list_lru didn't have list_lru_one for the\nmemcg of that object. The initial suspicions were either the object is\nnot allocated through kmem_cache_alloc_lru() or somehow\nmemcg_list_lru_alloc() failed to allocate list_lru_one() for a memcg but\nreturned success. No evidence were found for these cases.\n\nLooking more deeply, we started seeing situations where valid memcg's id\nis not present in mem_cgroup_idr and in some cases multiple valid memcgs\nhave same id and mem_cgroup_idr is pointing to one of them. So, the most\nreasonable explanation is that these situations can happen due to race\nbetween multiple idr_remove() calls or race between\nidr_alloc()/idr_replace() and idr_remove(). These races are causing\nmultiple memcgs to acquire the same ID and then offlining of one of them\nwould cleanup list_lrus on the system for all of them. Later access from\nother memcgs to the list_lru cause crashes due to missing list_lru_one." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: memcg: protege el acceso simult\u00e1neo a mem_cgroup_idr. el commit 73f576c04b94 (\"mm: memcontrol: repara el error de creaci\u00f3n de cgroup despu\u00e9s de muchos trabajos peque\u00f1os\") desacopla los ID de memcg del espacio de ID de CSS para reparar el cgroup. fracasos de la creaci\u00f3n. Introdujo IDR para mantener el espacio de identificaci\u00f3n de memcg. El IDR depende de mecanismos externos de sincronizaci\u00f3n para las modificaciones. Para mem_cgroup_idr, idr_alloc() e idr_replace() ocurren dentro de la devoluci\u00f3n de llamada CSS y, por lo tanto, est\u00e1n protegidos a trav\u00e9s de cgroup_mutex contra modificaciones simult\u00e1neas. Sin embargo, idr_remove() para mem_cgroup_idr no estaba protegido contra la concurrencia y se puede ejecutar simult\u00e1neamente para diferentes memcgs cuando alcanzan su referencia a cero. Arregla eso. Hemos estado viendo fallas del kernel basadas en list_lru con baja frecuencia en nuestra flota durante mucho tiempo. Estos fallos se produjeron en diferentes partes del c\u00f3digo list_lru, incluidos list_lru_add(), list_lru_del() y el c\u00f3digo de reparaci\u00f3n. Tras una inspecci\u00f3n m\u00e1s detallada, parec\u00eda que para un objeto determinado (dentry e inodo), el list_lru del super_block no ten\u00eda list_lru_one para el memcg de ese objeto. Las sospechas iniciales fueron que el objeto no estaba asignado a trav\u00e9s de kmem_cache_alloc_lru() o de alguna manera memcg_list_lru_alloc() no pudo asignar list_lru_one() para un memcg pero devolvi\u00f3 el \u00e9xito. No se encontraron pruebas de estos casos. Mirando m\u00e1s profundamente, comenzamos a ver situaciones en las que la identificaci\u00f3n de memcg v\u00e1lida no est\u00e1 presente en mem_cgroup_idr y, en algunos casos, varios memcg v\u00e1lidos tienen la misma identificaci\u00f3n y mem_cgroup_idr apunta a uno de ellos. Entonces, la explicaci\u00f3n m\u00e1s razonable es que estas situaciones pueden ocurrir debido a la ejecuci\u00f3n entre m\u00faltiples llamadas idr_remove() o la ejecuci\u00f3n entre idr_alloc()/idr_replace() e idr_remove(). Estas ejecuciones est\u00e1n provocando que varios memcgs adquieran el mismo ID y luego desconectar uno de ellos limpiar\u00eda list_lrus en el sistema para todos ellos. El acceso posterior desde otros memcgs a list_lru provoca bloqueos debido a que falta list_lru_one." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "ACA5323A-A089-48EF-85AA-99E8DF835386" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/37a060b64ae83b76600d187d76591ce488ab836b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51c0b1bb7541f8893ec1accba59eb04361a70946", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9972605a238339b85bd16b084eed5f18414d22db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43896.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43896.json index 4fcedb6ae51..eaa751af2f9 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43896.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43896.json @@ -2,24 +2,98 @@ "id": "CVE-2024-43896", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:04.387", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:37:16.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: cs-amp-lib: Fix NULL pointer crash if efi.get_variable is NULL\n\nCall efi_rt_services_supported() to check that efi.get_variable exists\nbefore calling it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: cs-amp-lib: soluciona el fallo del puntero NULL si efi.get_variable es NULL Llame a efi_rt_services_supported() para comprobar que efi.get_variable existe antes de llamarlo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "F07BD0FF-07AF-4DAD-8EB1-09FB50ABDC47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/5b6baaa7cbd77ff980516bad38bbc5a648bb5158", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc268085e499666b9f4f0fcb4c5a94e1c0b193b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43897.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43897.json index c1dc614c85f..4eae010174f 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43897.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43897", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:04.437", - "lastModified": "2024-08-29T17:15:08.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T18:36:30.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,108 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: elimine gso csum_start incorrecto y offset en virtio_net_hdr. Apriete las comprobaciones de csum_start y csum_offset en virtio_net_hdr_to_skb para paquetes GSO. La funci\u00f3n ya comprueba que una suma de comprobaci\u00f3n solicitada con VIRTIO_NET_HDR_F_NEEDS_CSUM est\u00e9 en skb lineal. Pero para los paquetes OSG esto podr\u00eda no ser v\u00e1lido para los segmentos posteriores a la segmentaci\u00f3n. Syzkaller demostr\u00f3 alcanzar esta advertencia en skb_checksum_help offset = skb_checksum_start_offset(skb); ret = -EINVAL; if (WARN_ON_ONCE(offset >= skb_headlen(skb))) Al inyectar un paquete TSO: ADVERTENCIA: CPU: 1 PID: 3539 en net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0 ip_do_fragment+0x209/0x1b20 net/ipv4 /ip_output.c:774 ip_finish_output_gso net/ipv4/ip_output.c:279 [en l\u00ednea] __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301 iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82 +0x2296 /0x2c70 net/ipv4/ip_tunnel.c:813 __gre_xmit net/ipv4/ip_gre.c:469 [en l\u00ednea] ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661 __netdev_start_xmit include/linux/netdevice.h:4850 [en l\u00ednea ] netdev_start_xmit include/linux/netdevice.h:4864 [en l\u00ednea] xmit_one net/core/dev.c:3595 [en l\u00ednea] dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611 __dev_queue_xmit+0x1b97/0x3c90 net/core/ dev.c:4261 paquete_snd net/packet/af_packet.c:3073 [en l\u00ednea] La geometr\u00eda del paquete de entrada incorrecto en tcp_gso_segment: [ 52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0 [ 52.003050] [ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244 [ 52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(tama\u00f1o=1552 tipo=3 segs=0)) [ 52.003050][ T8403] csum(0x60000c7 start=199 offset=1536 ip_summed=3 complete_sw=0 valid=0 nivel=0) Mitigar con una validaci\u00f3n de entrada m\u00e1s estricta. csum_offset: para paquetes GSO, deduzca el valor correcto de gso_type. Esto ya est\u00e1 hecho para la OSU. Ampliarlo a TSO. Sea UFO: udp[46]_ufo_fragment ignora estos campos y siempre calcula la suma de comprobaci\u00f3n en el software. csum_start: encontrar el desplazamiento real requiere analizar el encabezado de transporte. No agregue un analizador, utilice el an\u00e1lisis de segmentaci\u00f3n existente. Gracias a SKB_GSO_DODGY, eso tambi\u00e9n detecta paquetes defectuosos que se descargan correctamente. Nuevamente pruebe tanto TSO como USO. No pruebe UFO por el motivo anterior y no pruebe la descarga del t\u00fanel UDP. Los paquetes OSG casi siempre son CHECKSUM_PARTIAL. Los paquetes USO pueden ser CHECKSUM_NONE desde el commit 10154dbded6d6 (\"udp: Permitir transmisi\u00f3n GSO desde dispositivos sin descarga de suma de verificaci\u00f3n\"), pero a\u00fan as\u00ed estos campos se inicializan correctamente en udp4_hwcsum/udp6_hwcsum_outgoing. Por lo tanto, no es necesario probar primero ip_summed == CHECKSUM_PARTIAL. Esto revisa una soluci\u00f3n existente mencionada en la etiqueta Correcciones, que romp\u00eda paquetes peque\u00f1os con la descarga GSO, seg\u00fan lo detectado por kselftests." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.165", + "versionEndExcluding": "6.1.107", + "matchCriteriaId": "25C86ED2-0FD4-4A8A-9106-A059D760DE96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.44", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "83875505-0CFF-44AD-A3E1-BE3F8B866F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10.3", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "ECD67C7B-CA88-4F2B-B232-AE23DDFBA7D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2edbb3e8838c672cd7e247e47989df9d03fc6668", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6772c4868a8e7ad5305957cdb834ce881793acb7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89add40066f9ed9abe5f7f886fe5789ff7e0c50e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f01c5e335fbb7fb612d40f14a3c02e2612a43d3b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43898.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43898.json index ddc140673a2..487dd4599a6 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43898.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43898.json @@ -2,28 +2,101 @@ "id": "CVE-2024-43898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:04.493", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:31:14.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: sanity check for NULL pointer after ext4_force_shutdown\n\nTest case: 2 threads write short inline data to a file.\nIn ext4_page_mkwrite the resulting inline data is converted.\nHandling ext4_grp_locked_error with description \"block bitmap\nand bg descriptor inconsistent: X vs Y free clusters\" calls\next4_force_shutdown. The conversion clears\nEXT4_STATE_MAY_INLINE_DATA but fails for\next4_destroy_inline_data_nolock and ext4_mark_iloc_dirty due\nto ext4_forced_shutdown. The restoration of inline data fails\nfor the same reason not setting EXT4_STATE_MAY_INLINE_DATA.\nWithout the flag set a regular process path in ext4_da_write_end\nfollows trying to dereference page folio private pointer that has\nnot been set. The fix calls early return with -EIO error shall the\npointer to private be NULL.\n\nSample crash report:\n\nUnable to handle kernel paging request at virtual address dfff800000000004\nKASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]\nMem abort info:\n ESR = 0x0000000096000005\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x05: level 1 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[dfff800000000004] address between user and kernel address ranges\nInternal error: Oops: 0000000096000005 [#1] PREEMPT SMP\nModules linked in:\nCPU: 1 PID: 20274 Comm: syz-executor185 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : __block_commit_write+0x64/0x2b0 fs/buffer.c:2167\nlr : __block_commit_write+0x3c/0x2b0 fs/buffer.c:2160\nsp : ffff8000a1957600\nx29: ffff8000a1957610 x28: dfff800000000000 x27: ffff0000e30e34b0\nx26: 0000000000000000 x25: dfff800000000000 x24: dfff800000000000\nx23: fffffdffc397c9e0 x22: 0000000000000020 x21: 0000000000000020\nx20: 0000000000000040 x19: fffffdffc397c9c0 x18: 1fffe000367bd196\nx17: ffff80008eead000 x16: ffff80008ae89e3c x15: 00000000200000c0\nx14: 1fffe0001cbe4e04 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000001 x10: 0000000000ff0100 x9 : 0000000000000000\nx8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffdffc397c9c0 x4 : 0000000000000020 x3 : 0000000000000020\nx2 : 0000000000000040 x1 : 0000000000000020 x0 : fffffdffc397c9c0\nCall trace:\n __block_commit_write+0x64/0x2b0 fs/buffer.c:2167\n block_write_end+0xb4/0x104 fs/buffer.c:2253\n ext4_da_do_write_end fs/ext4/inode.c:2955 [inline]\n ext4_da_write_end+0x2c4/0xa40 fs/ext4/inode.c:3028\n generic_perform_write+0x394/0x588 mm/filemap.c:3985\n ext4_buffered_write_iter+0x2c0/0x4ec fs/ext4/file.c:299\n ext4_file_write_iter+0x188/0x1780\n call_write_iter include/linux/fs.h:2110 [inline]\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x968/0xc3c fs/read_write.c:590\n ksys_write+0x15c/0x26c fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __arm64_sys_write+0x7c/0x90 fs/read_write.c:652\n __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:152\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712\n el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730\n el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598\nCode: 97f85911 f94002da 91008356 d343fec8 (38796908)\n---[ end trace 0000000000000000 ]---\n----------------\nCode disassembly (best guess):\n 0:\t97f85911 \tbl\t0xffffffffffe16444\n 4:\tf94002da \tldr\tx26, [x22]\n 8:\t91008356 \tadd\tx22, x26, #0x20\n c:\td343fec8 \tlsr\tx8, x22, #3\n* 10:\t38796908 \tldrb\tw8, [x8, x25] <-- trapping instruction" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: verificaci\u00f3n de integridad del puntero NULL despu\u00e9s de ext4_force_shutdown Caso de prueba: 2 subprocesos escriben datos breves en l\u00ednea en un archivo. En ext4_page_mkwrite se convierten los datos en l\u00ednea resultantes. El manejo de ext4_grp_locked_error con la descripci\u00f3n \"mapa de bits de bloque y descriptor de bg inconsistentes: cl\u00fasteres libres X vs Y\" llama a ext4_force_shutdown. La conversi\u00f3n borra EXT4_STATE_MAY_INLINE_DATA pero falla para ext4_destroy_inline_data_nolock y ext4_mark_iloc_dirty debido a ext4_forced_shutdown. La restauraci\u00f3n de datos en l\u00ednea falla por el mismo motivo al no configurar EXT4_STATE_MAY_INLINE_DATA. Sin el indicador establecido, una ruta de proceso normal en ext4_da_write_end sigue intentando eliminar la referencia al puntero privado de la p\u00e1gina que no se ha configurado. La soluci\u00f3n llama al retorno anticipado con el error -EIO y el puntero a privado ser\u00e1 NULL. Informe de falla de muestra: No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual dfff800000000004 KASAN: null-ptr-deref en el rango [0x000000000000020-0x00000000000000027] Informaci\u00f3n de cancelaci\u00f3n de memoria: ESR = 0x0000000096000005 EC = 0x25: DABT (actual EL), IL = 32 bits CONJUNTO = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: error de traducci\u00f3n de nivel 1 Informaci\u00f3n de cancelaci\u00f3n de datos: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 direcci\u00f3n [dfff800000000004] entre los rangos de direcciones del usuario y del kernel Error interno: Ups: 0000000096000005 [#1] M\u00f3dulos SMP PREEMPT vinculados en: CPU: 1 PID: 20274 Comm: syz-executor185 No est\u00e1 contaminado 6.9.0-rc7-syzkaller-gfda5695d692c #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 27/03/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT - SSBS BTYPE=--) pc: __block_commit_write+0x64/0x2b0 fs/buffer.c:2167 lr: __block_commit_write+0x3c/0x2b0 fs/buffer.c:2160 sp: ffff8000a1957600 x29: ffff8000a1957610 x28: 00000000 x27: ffff0000e30e34b0 x26: 0000000000000000 x25 : dfff800000000000 x24: dfff800000000000 x23: fffffdffc397c9e0 x22: 0000000000000020 x21: 00000000000000020 x20: 0000000000000040 x19: ffc397c9c0 x18: 1fffe000367bd196 x17: ffff80008eead000 x16: ffff80008ae89e3c x15: 00000000200000c0 x14: 1fffe0001cbe4e04 x13: 00000000000000000 x 12: 0000000000000000 x11: 0000000000000001 x10: 0000000000ff0100 x9: 0000000000000000 x8: 0000000000000004 x7: 0000000000000000 x6: 0000000000000000 x5: fffffdffc397c9c0 x4: 00000000000000020 x3: 0000000000000020 x2: 000 0000000000040 x1: 0000000000000020 x0: fffffdffc397c9c0 Rastreo de llamadas: __block_commit_write+0x64/0x2b0 fs/buffer.c:2167 block_write_end+0xb4/0x104 fs/buffer .c:2253 ext4_da_do_write_end fs/ext4/inode.c:2955 [en l\u00ednea] ext4_da_write_end+0x2c4/0xa40 fs/ext4/inode.c:3028 generic_perform_write+0x394/0x588 mm/filemap.c:3985 ext4_buffered_write_iter+0x2c0/0 x4ecfs/ ext4/file.c:299 ext4_file_write_iter+0x188/0x1780 call_write_iter include/linux/fs.h:2110 [en l\u00ednea] new_sync_write fs/read_write.c:497 [en l\u00ednea] vfs_write+0x968/0xc3c fs/read_write.c:590 ksys_write+ 0x15c/0x26c fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [en l\u00ednea] __se_sys_write fs/read_write.c:652 [en l\u00ednea] __arm64_sys_write+0x7c/0x90 fs/read_write.c:652 __invoke_syscall arch/arm64/ n\u00facleo /syscall.c:34 [en l\u00ednea] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133 do_el0_svc+0x48/0x58 arch/arm64/ kernel/syscall.c:152 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/ arm64/kernel/entry.S:598 C\u00f3digo: 97f85911 f94002da 91008356 d343fec8 (38796908) ---[ end trace 00000000000000000 ]--------- TRUNCADO ----------" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.47", + "matchCriteriaId": "CF4F8EA7-C643-4B9C-8E32-BD81930A5E8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3f6bbe6e07e5239294ecc3d2efa70d1f98aed52e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83f4414b8f84249d538905825b088ff3ae555652", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f619876ccbfd329ae785fe5d3289b9dcd6eb5901", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43910.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43910.json index 961d821af8e..f622d4c84f1 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43910.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43910.json @@ -2,24 +2,88 @@ "id": "CVE-2024-43910", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.177", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:30:23.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses\n\nCurrently, it's possible to pass in a modified CONST_PTR_TO_DYNPTR to\na global function as an argument. The adverse effects of this is that\nBPF helpers can continue to make use of this modified\nCONST_PTR_TO_DYNPTR from within the context of the global function,\nwhich can unintentionally result in out-of-bounds memory accesses and\ntherefore compromise overall system stability i.e.\n\n[ 244.157771] BUG: KASAN: slab-out-of-bounds in bpf_dynptr_data+0x137/0x140\n[ 244.161345] Read of size 8 at addr ffff88810914be68 by task test_progs/302\n[ 244.167151] CPU: 0 PID: 302 Comm: test_progs Tainted: G O E 6.10.0-rc3-00131-g66b586715063 #533\n[ 244.174318] Call Trace:\n[ 244.175787] \n[ 244.177356] dump_stack_lvl+0x66/0xa0\n[ 244.179531] print_report+0xce/0x670\n[ 244.182314] ? __virt_addr_valid+0x200/0x3e0\n[ 244.184908] kasan_report+0xd7/0x110\n[ 244.187408] ? bpf_dynptr_data+0x137/0x140\n[ 244.189714] ? bpf_dynptr_data+0x137/0x140\n[ 244.192020] bpf_dynptr_data+0x137/0x140\n[ 244.194264] bpf_prog_b02a02fdd2bdc5fa_global_call_bpf_dynptr_data+0x22/0x26\n[ 244.198044] bpf_prog_b0fe7b9d7dc3abde_callback_adjust_bpf_dynptr_reg_off+0x1f/0x23\n[ 244.202136] bpf_user_ringbuf_drain+0x2c7/0x570\n[ 244.204744] ? 0xffffffffc0009e58\n[ 244.206593] ? __pfx_bpf_user_ringbuf_drain+0x10/0x10\n[ 244.209795] bpf_prog_33ab33f6a804ba2d_user_ringbuf_callback_const_ptr_to_dynptr_reg_off+0x47/0x4b\n[ 244.215922] bpf_trampoline_6442502480+0x43/0xe3\n[ 244.218691] __x64_sys_prlimit64+0x9/0xf0\n[ 244.220912] do_syscall_64+0xc1/0x1d0\n[ 244.223043] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 244.226458] RIP: 0033:0x7ffa3eb8f059\n[ 244.228582] Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8f 1d 0d 00 f7 d8 64 89 01 48\n[ 244.241307] RSP: 002b:00007ffa3e9c6eb8 EFLAGS: 00000206 ORIG_RAX: 000000000000012e\n[ 244.246474] RAX: ffffffffffffffda RBX: 00007ffa3e9c7cdc RCX: 00007ffa3eb8f059\n[ 244.250478] RDX: 00007ffa3eb162b4 RSI: 0000000000000000 RDI: 00007ffa3e9c7fb0\n[ 244.255396] RBP: 00007ffa3e9c6ed0 R08: 00007ffa3e9c76c0 R09: 0000000000000000\n[ 244.260195] R10: 0000000000000000 R11: 0000000000000206 R12: ffffffffffffff80\n[ 244.264201] R13: 000000000000001c R14: 00007ffc5d6b4260 R15: 00007ffa3e1c7000\n[ 244.268303] \n\nAdd a check_func_arg_reg_off() to the path in which the BPF verifier\nverifies the arguments of global function arguments, specifically\nthose which take an argument of type ARG_PTR_TO_DYNPTR |\nMEM_RDONLY. Also, process_dynptr_func() doesn't appear to perform any\nexplicit and strict type matching on the supplied register type, so\nlet's also enforce that a register either type PTR_TO_STACK or\nCONST_PTR_TO_DYNPTR is by the caller." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: agrega check_func_arg_reg_off() faltante para evitar accesos a memoria fuera de los l\u00edmites. Actualmente, es posible pasar un CONST_PTR_TO_DYNPTR modificado a una funci\u00f3n global como argumento. Los efectos adversos de esto es que los asistentes de BPF pueden continuar haciendo uso de este CONST_PTR_TO_DYNPTR modificado desde dentro del contexto de la funci\u00f3n global, lo que puede resultar involuntariamente en accesos a la memoria fuera de los l\u00edmites y, por lo tanto, comprometer la estabilidad general del sistema, es decir, [244.157771] ERROR : KASAN: losa fuera de los l\u00edmites en bpf_dynptr_data+0x137/0x140 [244.161345] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff88810914be68 por tarea test_progs/302 [244.167151] CPU: 0 PID: 302 Comm: test_progs Contaminado: GOE 6.10.0- rc3-00131-g66b586715063 #533 [244.174318] Seguimiento de llamadas: [244.175787] [244.177356] dump_stack_lvl+0x66/0xa0 [244.179531] print_report+0xce/0x670 [244. 182314] ? __virt_addr_valid+0x200/0x3e0 [ 244.184908] kasan_report+0xd7/0x110 [ 244.187408] ? bpf_dynptr_data+0x137/0x140 [244.189714]? bpf_dynptr_data+0x137/0x140 [ 244.192020] bpf_dynptr_data+0x137/0x140 [ 244.194264] bpf_prog_b02a02fdd2bdc5fa_global_call_bpf_dynptr_data+0x22/0x26 [ 244. 198044] bpf_prog_b0fe7b9d7dc3abde_callback_adjust_bpf_dynptr_reg_off+0x1f/0x23 [ 244.202136] bpf_user_ringbuf_drain+0x2c7/0x570 [ 244.204744] ? 0xffffffffc0009e58 [244.206593]? __pfx_bpf_user_ringbuf_drain+0x10/0x10 [ 244.209795] bpf_prog_33ab33f6a804ba2d_user_ringbuf_callback_const_ptr_to_dynptr_reg_off+0x47/0x4b [ 244.215922] 2502480+0x43/0xe3 [ 244.218691] __x64_sys_prlimit64+0x9/0xf0 [ 244.220912] do_syscall_64+0xc1/0x1d0 [ 244.223043] Entry_SYSCALL_64_after_hwframe+0x77/0x7f [244.226458] QEPD: 0033:0x7ffa3eb8f059 [ 244.228582] C\u00f3digo: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8f 1d 0d 00 f7 d8 64 89 01 48 [ 244.241307] RSP: 002b:00007ffa3e9c6eb8 EFLAGS: 00000206 ORIG_RAX: 0000000012e [ 244.246474] RAX: ffffffffffffffda RBX: 00007ffa3e9c7cdc RCX: 00007ffa3eb8f059 [ 244.250478] RDX: 00007ffa3eb162b4 RSI: 0000000000000000 RDI: 00007ffa3e9c7fb0 [ 244.255396] RBP: 00007ffa3e9c6ed0 R08: 00007ffa3e9c76c0 R 09: 0000000000000000 [ 244.260195] R10: 0000000000000000 R11: 0000000000000206 R12: ffffffffffffff80 [ 244.264201] R13: 000000000000001c R 14: 00007ffc5d6b4260 R15: 00007ffa3e1c7000 [ 244.268303 ] Agregue un check_func_arg_reg_off() a la ruta en la que el verificador BPF verifica los argumentos de las funciones globales, espec\u00edficamente aquellos que toman un argumento de tipo ARG_PTR_TO_DYNPTR | MEM_RDONLY. Adem\u00e1s, Process_dynptr_func() no parece realizar ninguna coincidencia de tipos expl\u00edcita y estricta en el tipo de registro proporcionado, por lo que tambi\u00e9n hagamos cumplir que un registro del tipo PTR_TO_STACK o CONST_PTR_TO_DYNPTR est\u00e9 a cargo de la persona que llama." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "48E239A0-A959-4FAB-8475-D045FED3DDA5" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/13663a7c644bf1dedaf461d07252db5d76c8759a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec2b9a5e11e51fea1bb04c1e7e471952e887e874", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43912.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43912.json index 5f498386802..40459e871a9 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43912.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43912.json @@ -2,32 +2,115 @@ "id": "CVE-2024-43912", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.280", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:19:17.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: disallow setting special AP channel widths\n\nSetting the AP channel width is meant for use with the normal\n20/40/... MHz channel width progression, and switching around\nin S1G or narrow channels isn't supported. Disallow that." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: nl80211: no permite configurar anchos de canal AP especiales. La configuraci\u00f3n del ancho del canal AP est\u00e1 manipulada para usarse con la progresi\u00f3n normal de ancho de canal de 20/40/... MHz y alternar entre No se admiten S1G ni canales estrechos. No permitir eso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.105", + "matchCriteriaId": "ECB889E5-9368-4201-9049-7289757A0B8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/23daf1b4c91db9b26f8425cc7039cf96d22ccbfe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d42f2125f6c89e1e71c87b9f23412afddbba45e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac3bf6e47fd8da9bfe8027e1acfe0282a91584fc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6ea738e3feb407a3283197d9a25d0788f4f3cee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43913.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43913.json index 6f9a4708e03..bbf9c125563 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43913.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43913.json @@ -2,24 +2,87 @@ "id": "CVE-2024-43913", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.330", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:12:55.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: apple: fix device reference counting\n\nDrivers must call nvme_uninit_ctrl after a successful nvme_init_ctrl.\nSplit the allocation side out to make the error handling boundary easier\nto navigate. The apple driver had been doing this wrong, leaking the\ncontroller device memory on a tagset failure." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nvme: apple: corrige el recuento de referencias del dispositivo Los controladores deben llamar a nvme_uninit_ctrl despu\u00e9s de un nvme_init_ctrl exitoso. Divida el lado de la asignaci\u00f3n para que sea m\u00e1s f\u00e1cil navegar por el l\u00edmite de manejo de errores. El controlador de Apple hab\u00eda estado haciendo esto mal, perdiendo la memoria del dispositivo controlador debido a una falla en el conjunto de etiquetas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "E4CB0927-C720-465B-99F2-3E47215515F2" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/b9ecbfa45516182cd062fecd286db7907ba84210", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d59c4d0eb6adc24c2201f153ccb7fd0a335b0d3d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43914.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43914.json index 3b787f70506..294b7e932dd 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43914.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43914.json @@ -2,48 +2,171 @@ "id": "CVE-2024-43914", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.380", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:03:49.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5: avoid BUG_ON() while continue reshape after reassembling\n\nCurrently, mdadm support --revert-reshape to abort the reshape while\nreassembling, as the test 07revert-grow. However, following BUG_ON()\ncan be triggerred by the test:\n\nkernel BUG at drivers/md/raid5.c:6278!\ninvalid opcode: 0000 [#1] PREEMPT SMP PTI\nirq event stamp: 158985\nCPU: 6 PID: 891 Comm: md0_reshape Not tainted 6.9.0-03335-g7592a0b0049a #94\nRIP: 0010:reshape_request+0x3f1/0xe60\nCall Trace:\n \n raid5_sync_request+0x43d/0x550\n md_do_sync+0xb7a/0x2110\n md_thread+0x294/0x2b0\n kthread+0x147/0x1c0\n ret_from_fork+0x59/0x70\n ret_from_fork_asm+0x1a/0x30\n \n\nRoot cause is that --revert-reshape update the raid_disks from 5 to 4,\nwhile reshape position is still set, and after reassembling the array,\nreshape position will be read from super block, then during reshape the\nchecking of 'writepos' that is caculated by old reshape position will\nfail.\n\nFix this panic the easy way first, by converting the BUG_ON() to\nWARN_ON(), and stop the reshape if checkings fail.\n\nNoted that mdadm must fix --revert-shape as well, and probably md/raid\nshould enhance metadata validation as well, however this means\nreassemble will fail and there must be user tools to fix the wrong\nmetadata." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md/raid5: evite BUG_ON() mientras contin\u00faa la remodelaci\u00f3n despu\u00e9s del reensamblaje. Actualmente, mdadm admite --revert-reshape para cancelar la remodelaci\u00f3n mientras se reensambla, como muestra la prueba 07revert-grow. Sin embargo, la prueba puede activar el siguiente BUG_ON(): kernel ERROR en drivers/md/raid5.c:6278! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP PTI sello de evento irq: 158985 CPU: 6 PID: 891 Comm: md0_reshape No contaminado 6.9.0-03335-g7592a0b0049a #94 RIP: 0010:reshape_request+0x3f1/0xe60 Seguimiento de llamadas: raid5_sync_request+0x43d/0x550 md_do_sync+0xb7a/0x2110 md_thread+0x294/0x2b0 kthread+0x147/0x1c0 ret_from_fork+0x59/0x70 ret_from_fork_asm+0x1a/0x30 La causa principal es que --revert-resha pe actualizar los raid_disks de 5 a 4, mientras la posici\u00f3n de remodelaci\u00f3n a\u00fan est\u00e1 establecida, y despu\u00e9s de volver a ensamblar la matriz, la posici\u00f3n de remodelaci\u00f3n se leer\u00e1 desde el superbloque, luego, durante la remodelaci\u00f3n, fallar\u00e1 la verificaci\u00f3n de 'writepos' calculada por la posici\u00f3n de remodelaci\u00f3n anterior. Primero solucione este p\u00e1nico de la manera m\u00e1s f\u00e1cil, convirtiendo BUG_ON() en WARN_ON() y detenga la remodelaci\u00f3n si las comprobaciones fallan. Se se\u00f1al\u00f3 que mdadm tambi\u00e9n debe corregir --revert-shape, y probablemente md/raid tambi\u00e9n deber\u00eda mejorar la validaci\u00f3n de metadatos; sin embargo, esto significa que el reensamblaje fallar\u00e1 y debe haber herramientas de usuario para corregir los metadatos incorrectos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.320", + "matchCriteriaId": "0B4EF915-550B-45E5-B2CA-648FEACD60FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.105", + "matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/2c92f8c1c456d556f15cbf51667b385026b2e6a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/305a5170dc5cf3d395bb4c4e9239bca6d0b54b49", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b33740c1750a39e046339ff9240e954f0156707", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4811d6e5d9f4090c3e0ff9890eb24077108046ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b33c468d543f6a83de2d61f09fec74b27e19fd2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/775a9ba16c9ffe98fe54ebf14e55d5660f2bf600", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf0ff69a42a3d2d46876d0514ecf13dffc516666", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c384dd4f1fb3b14a2fd199360701cc163ea88705", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44727.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44727.json index e1fb4e4ad87..7d0eeb294f9 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44727.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44727.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44727", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T17:15:12.617", - "lastModified": "2024-09-05T17:44:56.007", + "lastModified": "2024-09-05T18:35:07.867", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Sourcecodehero Event Management System1.0 is vulnerable to SQL Injection via the parameter 'username' in /event/admin/login.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/AslamMahi/CVE-Aslam-Mahi/blob/main/Sourcecodehero%20Event%20Management%20System/CVE-2024-44727.MD", diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44728.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44728.json index 77978c56e4b..3e6a0264cb6 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44728.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44728.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44728", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T17:15:12.730", - "lastModified": "2024-09-05T17:44:56.007", + "lastModified": "2024-09-05T18:35:09.257", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Sourcecodehero Event Management System 1.0 allows Stored Cross-Site Scripting via parameters Full Name, Address, Email, and contact# in /clientdetails/admin/regester.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/AslamMahi/CVE-Aslam-Mahi/blob/main/Sourcecodehero%20Event%20Management%20System/CVE-2024-44728.md", diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44793.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44793.json index ae8e0203551..289a1b0b723 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44793.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44793", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T20:15:08.007", - "lastModified": "2024-08-27T13:02:05.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:28:42.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2016-11-08", + "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4" + } + ] + } + ] + } + ], "references": [ { "url": "http://gazelle.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/WhatCD/Gazelle", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/WhatCD/Gazelle/issues/131", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44794.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44794.json index 8c42504a2f9..64626013861 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44794.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44794", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T20:15:08.073", - "lastModified": "2024-08-27T14:35:08.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:28:09.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-02-13", + "matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F" + } + ] + } + ] + } + ], "references": [ { "url": "http://picuploader.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/xiebruce/PicUploader", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/xiebruce/PicUploader/issues/91", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44795.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44795.json index 0ade5b25ce7..c56fc9c8ea1 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44795.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44795.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44795", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T20:15:08.140", - "lastModified": "2024-08-27T13:02:05.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:26:41.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2016-11-08", + "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4" + } + ] + } + ] + } + ], "references": [ { "url": "http://gazelle.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/WhatCD/Gazelle", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/WhatCD/Gazelle/issues/129", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45157.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45157.json new file mode 100644 index 00000000000..159fdc20b0d --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45157.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45157", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T19:15:12.960", + "lastModified": "2024-09-05T19:15:12.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Mbed TLS before 2.28.9 and 3.x before 3.6.1, in which the user-selected algorithm is not used. Unlike previously documented, enabling MBEDTLS_PSA_HMAC_DRBG_MD_TYPE does not cause the PSA subsystem to use HMAC_DRBG: it uses HMAC_DRBG only when MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG and MBEDTLS_CTR_DRBG_C are disabled." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Mbed-TLS/mbedtls/releases/", + "source": "cve@mitre.org" + }, + { + "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/", + "source": "cve@mitre.org" + }, + { + "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45158.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45158.json new file mode 100644 index 00000000000..a4ed5fc979f --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45158.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45158", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T19:15:13.057", + "lastModified": "2024-09-05T19:15:13.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Mbed TLS 3.6 before 3.6.1. A stack buffer overflow in mbedtls_ecdsa_der_to_raw() and mbedtls_ecdsa_raw_to_der() can occur when the bits parameter is larger than the largest supported curve. In some configurations with PSA disabled, all values of bits are affected. (This never happens in internal library calls, but can affect applications that call these functions directly.)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Mbed-TLS/mbedtls/releases/", + "source": "cve@mitre.org" + }, + { + "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/", + "source": "cve@mitre.org" + }, + { + "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-2/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45159.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45159.json new file mode 100644 index 00000000000..232be3d4356 --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45159.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45159", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T19:15:13.150", + "lastModified": "2024-09-05T19:15:13.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Mbed TLS 3.x before 3.6.1. With TLS 1.3, when a server enables optional authentication of the client, if the client-provided certificate does not have appropriate values in if keyUsage or extKeyUsage extensions, then the return value of mbedtls_ssl_get_verify_result() would incorrectly have the MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_KEY_USAGE bits clear. As a result, an attacker that had a certificate valid for uses other than TLS client authentication would nonetheless be able to use it for TLS client authentication. Only TLS 1.3 servers were affected, and only with optional authentication (with required authentication, the handshake would be aborted with a fatal alert)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Mbed-TLS/mbedtls/releases/", + "source": "cve@mitre.org" + }, + { + "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/", + "source": "cve@mitre.org" + }, + { + "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45171.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45171.json index 63c4feef871..893ab0242b3 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45171.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45171.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45171", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T16:15:08.477", - "lastModified": "2024-09-05T17:44:56.007", + "lastModified": "2024-09-05T18:35:10.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to upload dangerous files, for instance PHP code, to the C-MOR system. By analyzing the C-MOR web interface, it was found out that the upload functionality for backup files allows an authenticated user to upload arbitrary files. The only condition is that the filename contains a .cbkf string. Therefore, webshell.cbkf.php is considered a valid file name for the C-MOR web application. Uploaded files are stored within the directory \"/srv/www/backups\" on the C-MOR system, and can thus be accessed via the URL https:///backup/upload_. Due to broken access control, low-privileged authenticated users can also use this file upload functionality." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-026.txt", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45173.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45173.json index b71aa35e355..a7524b912e2 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45173.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45173.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45173", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T15:15:16.680", - "lastModified": "2024-09-05T17:44:56.007", + "lastModified": "2024-09-05T18:35:11.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper privilege management concerning sudo privileges, C-MOR is vulnerable to a privilege escalation attack. The Linux user www-data running the C-MOR web interface can execute some OS commands as root via Sudo without having to enter the root password. These commands, for example, include cp, chown, and chmod, which enable an attacker to modify the system's sudoers file in order to execute all commands with root privileges. Thus, it is possible to escalate the limited privileges of the user www-data to root privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-027.txt", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45175.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45175.json index 2cbfed477d0..f545e85aa76 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45175.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45175.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45175", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T16:15:08.553", - "lastModified": "2024-09-05T17:44:56.007", + "lastModified": "2024-09-05T18:35:12.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,46 @@ "value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Sensitive information is stored in cleartext. It was found out that sensitive information, for example login credentials of cameras, is stored in cleartext. Thus, an attacker with filesystem access, for example exploiting a path traversal attack, has access to the login data of all configured cameras, or the configured FTP server." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-028.txt", diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45265.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45265.json index b0b334b7a1e..3ece67b3493 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45265.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45265.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45265", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T18:15:07.380", - "lastModified": "2024-08-27T14:35:12.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T18:30:23.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:skyss:arfa-cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.3132", + "matchCriteriaId": "C3D99F61-F668-4C88-B619-C6F828C893DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/TheHermione/CVE-2024-45265", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://skyss.ru", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json new file mode 100644 index 00000000000..071490b977d --- /dev/null +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45401.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45401", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-05T18:15:06.227", + "lastModified": "2024-09-05T18:15:06.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "stripe-cli is a command-line tool for the payment processor Stripe. A vulnerability exists in stripe-cli starting in version 1.11.1 and prior to version 1.21.3 where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files. The update in version 1.21.3 addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path. There has been no evidence of exploitation of this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/stripe/stripe-cli/security/advisories/GHSA-fv4g-gwpj-74gr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45589.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45589.json index 9ad8ae3bfa3..e42e83f035d 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45589.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45589.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45589", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T16:15:08.737", - "lastModified": "2024-09-05T17:44:56.007", + "lastModified": "2024-09-05T18:35:13.200", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "RapidIdentity LTS through 2023.0.2 and Cloud through 2024.08.0 improperly restricts excessive authentication attempts and allows a remote attacker to cause a denial of service via the username parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], "references": [ { "url": "https://benrogozinski.github.io/CVE-2024-45589/", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6421.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6421.json index 13b47f1aff9..2ea45621282 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6421.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6421.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6421", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-10T08:15:11.720", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T18:11:43.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,127 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pepperl-fuchs:oit700-f113-b12-cb_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "784251D9-E5BC-406B-A0B5-BF01706DBFE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pepperl-fuchs:oit700-f113-b12-cb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25864D9A-0BEA-4427-95D2-FBBEA77A0572" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pepperl-fuchs:oit500-f113-b12-cb_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "E24C955B-F5AD-4137-8A89-46B99F119A42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pepperl-fuchs:oit500-f113-b12-cb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A14DBBC-7129-419B-8158-A2AED41D22C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pepperl-fuchs:oit200-f113-b12-cb_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "A73CFD0C-620A-44DF-97E5-8938315D533A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pepperl-fuchs:oit200-f113-b12-cb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D529BA26-283D-4BCF-BAFD-242105AA9649" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pepperl-fuchs:oit1500-f113-b12-cb_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "2407367C-A857-4990-9650-10B61BAD23D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pepperl-fuchs:oit1500-f113-b12-cb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23096D3E-2836-4FA1-9878-831C69EE5AE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-038", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6422.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6422.json index 575d6cd3e6e..89dc3e6d679 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6422.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6422.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6422", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-10T08:15:11.970", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T18:20:31.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,127 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pepperl-fuchs:oit700-f113-b12-cb_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "784251D9-E5BC-406B-A0B5-BF01706DBFE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pepperl-fuchs:oit700-f113-b12-cb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25864D9A-0BEA-4427-95D2-FBBEA77A0572" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pepperl-fuchs:oit500-f113-b12-cb_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "E24C955B-F5AD-4137-8A89-46B99F119A42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pepperl-fuchs:oit500-f113-b12-cb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A14DBBC-7129-419B-8158-A2AED41D22C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pepperl-fuchs:oit200-f113-b12-cb_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "A73CFD0C-620A-44DF-97E5-8938315D533A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pepperl-fuchs:oit200-f113-b12-cb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D529BA26-283D-4BCF-BAFD-242105AA9649" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:pepperl-fuchs:oit1500-f113-b12-cb_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.11.0", + "matchCriteriaId": "2407367C-A857-4990-9650-10B61BAD23D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:pepperl-fuchs:oit1500-f113-b12-cb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23096D3E-2836-4FA1-9878-831C69EE5AE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-038", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7401.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7401.json index 4abef46abe8..1e0eeb9bc99 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7401.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7401.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7401", "sourceIdentifier": "psirt@netskope.com", "published": "2024-08-26T17:15:06.987", - "lastModified": "2024-08-28T06:15:06.320", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T18:34:17.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "psirt@netskope.com", "type": "Secondary", @@ -73,14 +105,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netskope:netskope:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6839F225-C83A-4132-8802-E088178691C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.netskope.com/en/secure-enrollment/", - "source": "psirt@netskope.com" + "source": "psirt@netskope.com", + "tags": [ + "Product" + ] }, { "url": "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2024-001", - "source": "psirt@netskope.com" + "source": "psirt@netskope.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json new file mode 100644 index 00000000000..4bfda040b07 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7591", + "sourceIdentifier": "security@progress.com", + "published": "2024-09-05T18:15:06.480", + "lastModified": "2024-09-05T18:15:06.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.This issue affects:\n\n* LoadMaster: 7.2.40.0 and above\n\n* ECS: All versions\n\n* Multi-Tenancy: 7.1.35.4 and above" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8173.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8173.json index fd44d8abfcb..71280899a59 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8173.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8173.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8173", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-26T16:15:11.800", - "lastModified": "2024-08-26T19:10:09.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T18:39:00.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. Affected is an unknown function of the file /login.php of the component Login Page. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad clasificada como cr\u00edtica fue encontrada en el proyecto de c\u00f3digo Blood Bank System 1.0. Una funci\u00f3n desconocida del archivo /login.php del componente Login Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento usuario conduce a la inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,26 +140,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blood_bank_system_project:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "22113613-2FC7-4FFC-90C1-D54D63A5108B" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/prankfulin/cve/blob/main/sql1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275772", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275772", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.397882", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 169266fe8f6..9e402636899 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-05T18:00:18.857841+00:00 +2024-09-05T20:00:17.701885+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-05T17:59:36.770000+00:00 +2024-09-05T19:58:35.130000+00:00 ``` ### Last Data Feed Release @@ -33,57 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262027 +262033 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `6` -- [CVE-2023-51712](CVE-2023/CVE-2023-517xx/CVE-2023-51712.json) (`2024-09-05T16:15:06.970`) -- [CVE-2024-24759](CVE-2024/CVE-2024-247xx/CVE-2024-24759.json) (`2024-09-05T17:15:12.380`) -- [CVE-2024-42885](CVE-2024/CVE-2024-428xx/CVE-2024-42885.json) (`2024-09-05T16:15:07.720`) -- [CVE-2024-44727](CVE-2024/CVE-2024-447xx/CVE-2024-44727.json) (`2024-09-05T17:15:12.617`) -- [CVE-2024-44728](CVE-2024/CVE-2024-447xx/CVE-2024-44728.json) (`2024-09-05T17:15:12.730`) -- [CVE-2024-45096](CVE-2024/CVE-2024-450xx/CVE-2024-45096.json) (`2024-09-05T16:15:07.810`) -- [CVE-2024-45097](CVE-2024/CVE-2024-450xx/CVE-2024-45097.json) (`2024-09-05T16:15:08.050`) -- [CVE-2024-45098](CVE-2024/CVE-2024-450xx/CVE-2024-45098.json) (`2024-09-05T16:15:08.283`) -- [CVE-2024-45171](CVE-2024/CVE-2024-451xx/CVE-2024-45171.json) (`2024-09-05T16:15:08.477`) -- [CVE-2024-45175](CVE-2024/CVE-2024-451xx/CVE-2024-45175.json) (`2024-09-05T16:15:08.553`) -- [CVE-2024-45176](CVE-2024/CVE-2024-451xx/CVE-2024-45176.json) (`2024-09-05T16:15:08.630`) -- [CVE-2024-45392](CVE-2024/CVE-2024-453xx/CVE-2024-45392.json) (`2024-09-05T17:15:12.807`) -- [CVE-2024-45589](CVE-2024/CVE-2024-455xx/CVE-2024-45589.json) (`2024-09-05T16:15:08.737`) +- [CVE-2024-42491](CVE-2024/CVE-2024-424xx/CVE-2024-42491.json) (`2024-09-05T18:15:05.707`) +- [CVE-2024-45157](CVE-2024/CVE-2024-451xx/CVE-2024-45157.json) (`2024-09-05T19:15:12.960`) +- [CVE-2024-45158](CVE-2024/CVE-2024-451xx/CVE-2024-45158.json) (`2024-09-05T19:15:13.057`) +- [CVE-2024-45159](CVE-2024/CVE-2024-451xx/CVE-2024-45159.json) (`2024-09-05T19:15:13.150`) +- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2024-09-05T18:15:06.227`) +- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-09-05T18:15:06.480`) ### CVEs modified in the last Commit -Recently modified CVEs: `101` - -- [CVE-2024-6148](CVE-2024/CVE-2024-61xx/CVE-2024-6148.json) (`2024-09-05T17:51:48.560`) -- [CVE-2024-6945](CVE-2024/CVE-2024-69xx/CVE-2024-6945.json) (`2024-09-05T16:14:31.237`) -- [CVE-2024-6946](CVE-2024/CVE-2024-69xx/CVE-2024-6946.json) (`2024-09-05T16:14:28.857`) -- [CVE-2024-6947](CVE-2024/CVE-2024-69xx/CVE-2024-6947.json) (`2024-09-05T16:14:25.513`) -- [CVE-2024-7057](CVE-2024/CVE-2024-70xx/CVE-2024-7057.json) (`2024-09-05T17:33:21.630`) -- [CVE-2024-7060](CVE-2024/CVE-2024-70xx/CVE-2024-7060.json) (`2024-09-05T17:30:34.897`) -- [CVE-2024-7091](CVE-2024/CVE-2024-70xx/CVE-2024-7091.json) (`2024-09-05T17:32:20.553`) -- [CVE-2024-7834](CVE-2024/CVE-2024-78xx/CVE-2024-7834.json) (`2024-09-05T17:52:06.147`) -- [CVE-2024-7884](CVE-2024/CVE-2024-78xx/CVE-2024-7884.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8289](CVE-2024/CVE-2024-82xx/CVE-2024-8289.json) (`2024-09-05T17:41:58.350`) -- [CVE-2024-8413](CVE-2024/CVE-2024-84xx/CVE-2024-8413.json) (`2024-09-05T17:40:36.953`) -- [CVE-2024-8445](CVE-2024/CVE-2024-84xx/CVE-2024-8445.json) (`2024-09-05T17:44:56.007`) -- [CVE-2024-8461](CVE-2024/CVE-2024-84xx/CVE-2024-8461.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8462](CVE-2024/CVE-2024-84xx/CVE-2024-8462.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8463](CVE-2024/CVE-2024-84xx/CVE-2024-8463.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8464](CVE-2024/CVE-2024-84xx/CVE-2024-8464.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8465](CVE-2024/CVE-2024-84xx/CVE-2024-8465.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8466](CVE-2024/CVE-2024-84xx/CVE-2024-8466.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8467](CVE-2024/CVE-2024-84xx/CVE-2024-8467.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8468](CVE-2024/CVE-2024-84xx/CVE-2024-8468.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8469](CVE-2024/CVE-2024-84xx/CVE-2024-8469.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8470](CVE-2024/CVE-2024-84xx/CVE-2024-8470.json) (`2024-09-05T17:45:07.877`) -- [CVE-2024-8471](CVE-2024/CVE-2024-84xx/CVE-2024-8471.json) (`2024-09-05T17:44:56.007`) -- [CVE-2024-8472](CVE-2024/CVE-2024-84xx/CVE-2024-8472.json) (`2024-09-05T17:44:56.007`) -- [CVE-2024-8473](CVE-2024/CVE-2024-84xx/CVE-2024-8473.json) (`2024-09-05T17:44:56.007`) +Recently modified CVEs: `72` + +- [CVE-2024-43887](CVE-2024/CVE-2024-438xx/CVE-2024-43887.json) (`2024-09-05T19:43:44.197`) +- [CVE-2024-43890](CVE-2024/CVE-2024-438xx/CVE-2024-43890.json) (`2024-09-05T18:48:30.320`) +- [CVE-2024-43891](CVE-2024/CVE-2024-438xx/CVE-2024-43891.json) (`2024-09-05T18:46:18.440`) +- [CVE-2024-43892](CVE-2024/CVE-2024-438xx/CVE-2024-43892.json) (`2024-09-05T18:41:38.723`) +- [CVE-2024-43896](CVE-2024/CVE-2024-438xx/CVE-2024-43896.json) (`2024-09-05T18:37:16.483`) +- [CVE-2024-43897](CVE-2024/CVE-2024-438xx/CVE-2024-43897.json) (`2024-09-05T18:36:30.347`) +- [CVE-2024-43898](CVE-2024/CVE-2024-438xx/CVE-2024-43898.json) (`2024-09-05T18:31:14.293`) +- [CVE-2024-43910](CVE-2024/CVE-2024-439xx/CVE-2024-43910.json) (`2024-09-05T18:30:23.437`) +- [CVE-2024-43912](CVE-2024/CVE-2024-439xx/CVE-2024-43912.json) (`2024-09-05T18:19:17.067`) +- [CVE-2024-43913](CVE-2024/CVE-2024-439xx/CVE-2024-43913.json) (`2024-09-05T18:12:55.680`) +- [CVE-2024-43914](CVE-2024/CVE-2024-439xx/CVE-2024-43914.json) (`2024-09-05T18:03:49.997`) +- [CVE-2024-44727](CVE-2024/CVE-2024-447xx/CVE-2024-44727.json) (`2024-09-05T18:35:07.867`) +- [CVE-2024-44728](CVE-2024/CVE-2024-447xx/CVE-2024-44728.json) (`2024-09-05T18:35:09.257`) +- [CVE-2024-44793](CVE-2024/CVE-2024-447xx/CVE-2024-44793.json) (`2024-09-05T18:28:42.687`) +- [CVE-2024-44794](CVE-2024/CVE-2024-447xx/CVE-2024-44794.json) (`2024-09-05T18:28:09.247`) +- [CVE-2024-44795](CVE-2024/CVE-2024-447xx/CVE-2024-44795.json) (`2024-09-05T18:26:41.490`) +- [CVE-2024-45171](CVE-2024/CVE-2024-451xx/CVE-2024-45171.json) (`2024-09-05T18:35:10.600`) +- [CVE-2024-45173](CVE-2024/CVE-2024-451xx/CVE-2024-45173.json) (`2024-09-05T18:35:11.413`) +- [CVE-2024-45175](CVE-2024/CVE-2024-451xx/CVE-2024-45175.json) (`2024-09-05T18:35:12.220`) +- [CVE-2024-45265](CVE-2024/CVE-2024-452xx/CVE-2024-45265.json) (`2024-09-05T18:30:23.883`) +- [CVE-2024-45589](CVE-2024/CVE-2024-455xx/CVE-2024-45589.json) (`2024-09-05T18:35:13.200`) +- [CVE-2024-6421](CVE-2024/CVE-2024-64xx/CVE-2024-6421.json) (`2024-09-05T18:11:43.297`) +- [CVE-2024-6422](CVE-2024/CVE-2024-64xx/CVE-2024-6422.json) (`2024-09-05T18:20:31.983`) +- [CVE-2024-7401](CVE-2024/CVE-2024-74xx/CVE-2024-7401.json) (`2024-09-05T18:34:17.433`) +- [CVE-2024-8173](CVE-2024/CVE-2024-81xx/CVE-2024-8173.json) (`2024-09-05T18:39:00.950`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7258a4e8063..30d71322a10 100644 --- a/_state.csv +++ b/_state.csv @@ -153867,7 +153867,7 @@ CVE-2020-24194,0,0,5b90090107d29f2f11ff3959af64bb5060c6e7bed49ac494e26c0b24ecefb CVE-2020-24195,0,0,befd0c430e4d1ef7b8a1be08af12bb8b3d414beb9eb254d56854047c04294665,2020-09-15T16:59:25.990000 CVE-2020-24196,0,0,86645ebba61d71fb4d54ae9f027af99a5843de1e042289ac6312e8444a51d9b6,2020-09-02T16:49:40.777000 CVE-2020-24197,0,0,723e3ae6da543830e22e28fe2841d413930a5160a1f609bc252a3f53abb68f35,2020-09-15T15:50:04.857000 -CVE-2020-24198,0,0,136864f522cb99467d6887e3af46adac4b7fb5451326bc78f7e8f49b1a266f4a,2020-09-15T16:52:29.257000 +CVE-2020-24198,0,1,fd8a1be30f42699047d45910f4c2657d99b491b075ee8fed0d45a49aadac9b8e,2024-09-05T19:15:12.033000 CVE-2020-24199,0,0,f39282985de3f1cad9fa2006126026f95615216b580c10b1cf47f7ef1f2b756d,2020-09-10T01:58:07.613000 CVE-2020-24200,0,0,48903473c4f64a50e47cde0aab311c57314f4bff29894dee5f9fcbc3511b6517,2023-11-07T03:19:51.410000 CVE-2020-24202,0,0,aca9347d15938f12c32a4656c36fccdbf170812ee017f7739b90841c9cc9796a,2020-08-31T16:06:50.940000 @@ -154845,7 +154845,7 @@ CVE-2020-25655,0,0,e805a4e8dd952dce03a4ceed95f584444e1f5547d09390f25dd1dee93742e CVE-2020-25656,0,0,923f99456dc866a46261cd52c92b9e8c7b624548d49c3b8d3a9fbca5852fdc8f,2022-10-25T17:03:04.803000 CVE-2020-25657,0,0,ef75569b9a4e89e230c33f10a7b600a631ae8f063adbfb3cffdaec8ec7c9f589,2023-02-12T23:40:35.250000 CVE-2020-25658,0,0,52a1677685adf1c8de34af89b36e60d2d3fb3bac5335aa1b88cdd46c81e6b575,2023-02-12T23:40:35.463000 -CVE-2020-25659,0,1,eaf9b4aed2111b6494d8e721d23261704576caccd1fcd3a29b5917e2c100089a,2024-09-05T16:10:54.837000 +CVE-2020-25659,0,0,eaf9b4aed2111b6494d8e721d23261704576caccd1fcd3a29b5917e2c100089a,2024-09-05T16:10:54.837000 CVE-2020-2566,0,0,5b3ace010328f69aa0712dda4da40d0e0f2a31b0e8293d37a32488aa3f00954d,2022-07-28T14:30:14.633000 CVE-2020-25660,0,0,8c440c4bb5dcd6c3968a4d737281c44e67233098d63c1771be9085669c2ed894,2023-11-07T03:20:20.120000 CVE-2020-25661,0,0,5e37c12faa8c3233f4aa1eceeef0dafee1c804852c074ab07a40bffcf72e011c,2023-02-12T23:40:35.860000 @@ -158840,7 +158840,7 @@ CVE-2020-36239,0,0,7b41ba7657ad73626dbdd86511b12d7f0170fd52dcfe35bd88b348cf3ed32 CVE-2020-3624,0,0,fc401c04769ad298ed6d3d2a6901ccde918f4132bfb35a25f7ed968bb6eaf41d,2020-09-10T13:22:35.710000 CVE-2020-36240,0,0,0a497f4d578072de340d2581f170cb8868527fd5785c43e1a9901dd077bfdbfe,2021-07-21T11:39:23.747000 CVE-2020-36241,0,0,f0aa7d0d8a8729b6e05784c98a61b71e3dcbda017b1970dbd8cf6428dbc8d84a,2023-11-07T03:22:08.167000 -CVE-2020-36242,0,1,ad732bb2f49acc4a1bb3d22394ed60e61466a8436e7bcecae9597b6065590b9c,2024-09-05T16:09:10.430000 +CVE-2020-36242,0,0,ad732bb2f49acc4a1bb3d22394ed60e61466a8436e7bcecae9597b6065590b9c,2024-09-05T16:09:10.430000 CVE-2020-36243,0,0,9ffbcf5c05c27cf2ab62212d25780e02045f859df907e11ee405a2ee94f4ecb6,2021-06-01T17:44:28.520000 CVE-2020-36244,0,0,44f221c538c58ea366b8b17522360a1659646f2bc396f303f7b5023ed65e6287,2023-02-03T19:12:53.277000 CVE-2020-36245,0,0,75d791c44f5f85789d19cec2bae3f6dcfc3d9f2e93847ea4e7a45cc028b94fd7,2021-07-21T11:39:23.747000 @@ -210239,7 +210239,7 @@ CVE-2022-45801,0,0,c808b2aef48cf39acc9dd41dac44a882f25b2fe23e6cda4e5fbaf8d0cb604 CVE-2022-45802,0,0,eaf1e2dfd0d966e6ae0663c2dccbfda6fe4dbaa6ca30e730e8dfd62fbbf8711d,2023-06-26T11:15:09.653000 CVE-2022-45803,0,0,efa1db42f69eee0460aade15ad353e13136adedd726800a1f2e310c8a9bb1912,2024-06-24T18:51:29.867000 CVE-2022-45804,0,0,320bcdc47b31f62d100a1cee6d46af8afbbc9a8e64e32f0dc990e728420bbadd,2023-11-07T03:54:50.113000 -CVE-2022-45805,0,1,fb0d479c9f7c3034cbd768e43f49157483a4b989ea9762df48bb49bb75471a89,2024-09-05T16:35:01.640000 +CVE-2022-45805,0,0,fb0d479c9f7c3034cbd768e43f49157483a4b989ea9762df48bb49bb75471a89,2024-09-05T16:35:01.640000 CVE-2022-45807,0,0,5830d2d6b8c0118a933b424c04c9d33d9c4b6d8d4315937e0a490664dfcff809,2023-11-07T03:54:50.343000 CVE-2022-45808,0,0,f0992aaefa1bb485183a097d0a3443361d7eb97bad85ef726e7af080fcc9bc37,2023-11-07T03:54:50.520000 CVE-2022-45809,0,0,ad9b0991c605802b6f7a2b87420a3b262e2c0930ec91e9b19bc01ed3260503df,2023-12-22T20:38:04.883000 @@ -210965,7 +210965,7 @@ CVE-2022-46803,0,0,369c8ead3b4ac383bd284c861fb3ff64be6cdde1caa75617e736bc441a73c CVE-2022-46804,0,0,0a65dce276f0d246a015800000390d38fd06d9566a948a5b3eb9969f9c71d583,2023-11-14T20:03:28.507000 CVE-2022-46805,0,0,53d77809136ccec062192aae71bffdd64c6010a19e2af2842113d5289ff4ed62,2023-11-07T03:56:01.813000 CVE-2022-46806,0,0,4e2d3dd5865d1d596894b3c6de79fd9b18a38233a7f3eca1fe892b11e3acd565,2023-11-07T03:56:02.013000 -CVE-2022-46808,0,0,f0e08f4b06361c4bad281759d64cac20a52c5e23fbb39cc483232b0cb7c5f789,2023-11-09T19:17:06.370000 +CVE-2022-46808,0,1,3dace1e4e0f9c4be75339d72940a49ae7824c83f5d5c372be189963070399215,2024-09-05T19:35:02.103000 CVE-2022-46809,0,0,e4d5614724bf94ceab775065a2e5d61bad491fdc84d7df02ce0f975ac6398dab,2023-11-14T20:01:40.617000 CVE-2022-4681,0,0,8b95df098a8867bf7f3af4d464f4675b8ca57886939618ac4db5d4346e95e96c,2023-11-07T03:58:35.313000 CVE-2022-46810,0,0,a6e0cafbaaf95fa85229c969fbf49d522b8c634764b495c5a4c6704b8b0ae28d,2023-06-01T13:06:50.170000 @@ -210975,7 +210975,7 @@ CVE-2022-46814,0,0,5a458804c40c25f2d1fbc3767fa9583b9f1cce041b86c09ad5de0726b5425 CVE-2022-46815,0,0,0023dd52904ccf7596267126a45327b607e61525d26da3c95eeaac48cdde1574,2023-11-07T03:56:02.407000 CVE-2022-46816,0,0,1bafdd4522cf45487b1e6a53db719b56f69efba7830cef42c61523204246eb3f,2023-05-31T00:52:43.880000 CVE-2022-46817,0,0,e0c909fd72cda88c5befcf2dcd26b9bb5ca314f021b3e4f1b371f217d90790d9,2023-05-15T19:45:11.683000 -CVE-2022-46818,0,0,277f188ba84494bf998763e661206196e8997ae82da3c737b1c5e7650c11e2e6,2023-11-13T17:46:37.237000 +CVE-2022-46818,0,1,76da5e5ff33fb6c81a1d1ae69ad7fd6533a47d19cd62d7da3c3eb5f545ed9cb9,2024-09-05T19:35:02.377000 CVE-2022-46819,0,0,2c8b01a04f32b519d160e8144b4858921c56618717193dfe4c012b40dffc5065,2023-05-16T16:17:27.237000 CVE-2022-4682,0,0,1af58b9b1808373745cde3c60fcd805ba1670844176dd8983a5ab765b22079a4,2023-11-07T03:58:35.507000 CVE-2022-46820,0,0,243b6f35afd6b920da449d2bcc87330b9cfa064566ddf1d5becdb1f79fd486b6,2023-06-01T13:11:36.420000 @@ -211014,7 +211014,7 @@ CVE-2022-46855,0,0,56d91aca5a644bdde5be020d97cbf7b12f7027eb209f024eb83028393c449 CVE-2022-46856,0,0,785416b57388fa30d2fbf6de0fc2dbc493a8611b4a4d91f79b32df2e911dc52d,2023-06-01T13:11:03.053000 CVE-2022-46857,0,0,ee06c53a609488fbb8ed5e7108d7a1dd36e82b93aa20115f914b593e8e1f1e13,2023-07-27T14:00:16.117000 CVE-2022-46858,0,0,dd81c76525185f7a9b6cca41e03693555b96fc45e6d1fb8e356277a3f18e769d,2023-05-12T01:52:56.403000 -CVE-2022-46859,0,0,d39b511a8031e150678aff34f97dcbe201a0ee6bb406b440209528a610239620,2023-11-09T19:16:38.763000 +CVE-2022-46859,0,1,4a88f8f519def37a7903aa4d50239143b262e191aefe0490c940e5a7be3a886f,2024-09-05T19:35:02.683000 CVE-2022-4686,0,0,c399dd966921dc1ebd1a2a0d2b94457339f7f049dde4c8c88e21442bdb026acd,2023-06-27T06:15:43.560000 CVE-2022-46860,0,0,c571774b7ea66509f74269d546ab6bbc9dc099b63611a0c664d2ba769020bcba,2023-11-14T15:35:56.607000 CVE-2022-46861,0,0,27189b13416db6769bae0e35cae6b5e084e096f2736e3b8330ef01081f90594c,2023-05-16T16:17:13.987000 @@ -211362,7 +211362,7 @@ CVE-2022-47420,0,0,880106f38441c8fddd71b5d1efae01c6a4ed7be15fa99aa6ec33a3d4a0547 CVE-2022-47421,0,0,cd1af718e3945e04c23dc5a1015e787a1697891cc787b86557e0fcda15fcc61b,2023-07-27T13:51:48.583000 CVE-2022-47422,0,0,39ec2a25cd42f7bf74878e40f71b512f34e590e25bfc4223cf911aa51262b944,2023-11-07T03:56:14.373000 CVE-2022-47423,0,0,e8cf0fdcae3d131fb0c4536d06b1caab491082bdf58a35a0d50963816c32e103,2023-05-16T22:08:09.307000 -CVE-2022-47426,0,0,a331ad8ca74029182a0072ca854e14add64c19f9b3e481df4fc1a5c0b95ca824,2023-11-09T19:15:51.560000 +CVE-2022-47426,0,1,8a7d4f6dfe3868ec533ba7bbf4c8e5e8918055f9f79b05ac9acee9951f2d90a3,2024-09-05T19:35:02.953000 CVE-2022-47427,0,0,0d54fdaafb6afe29ec7a6d4d455c5733ddd51f32bebe08c362da726500863468,2023-11-07T03:56:14.543000 CVE-2022-47428,0,0,d2b1a8b9d0f3771744899574cbc2c7f7a272472f4b9f5da3bbae561466db11e7,2023-11-14T15:35:13.593000 CVE-2022-4743,0,0,2374ab5d8f1e44a701059bcdb57ce3e02efa438751c6a3421f45ab1f2a3a0f38,2023-05-03T12:16:43.400000 @@ -211382,7 +211382,7 @@ CVE-2022-47441,0,0,ad75b9fc4b1159b0e3a3836cdde1db371ec634406bd01c39d618e8a5502d6 CVE-2022-47442,0,0,8739a8a5d1732133212c49accdc99c608ccb3e35ed21319cf1e3d94f58971c9e,2024-09-04T21:35:03.140000 CVE-2022-47443,0,0,f3515c60fd4f71ff9333641d9a1e0aa7946c04420fb0afbf849e665f04ab955d,2023-11-07T03:56:15.720000 CVE-2022-47444,0,0,6624a8a1c3b9de9de1701d058fc5912d473ea3542c518e98f1d8de690761bc95,2023-11-07T03:56:15.930000 -CVE-2022-47445,0,0,fe0c06b2828283e735300ce41048705f592acf984eb768493a2a7e172710e889,2023-11-09T19:12:35.517000 +CVE-2022-47445,0,1,b11c350216f07ac5b657d219600f06905c0c0562ab8a865c5e75560f8682b702,2024-09-05T18:35:01.370000 CVE-2022-47446,0,0,83b1c896c5c167280e3a1efadbbd80b817554e557ce03717a283513f01e521e4,2023-05-30T17:47:25.017000 CVE-2022-47447,0,0,e190bcf416043cc6839d125742303a5093000d65eb02279f6356422a385db953,2023-05-30T17:46:04.750000 CVE-2022-47448,0,0,3fc801e4772dc4e483f5041fb67f263631a138235229f497dffcf10544b4f237,2023-05-30T17:45:12.073000 @@ -211500,7 +211500,7 @@ CVE-2022-47581,0,0,31a371bb55d699f8f9855cd1db50625c68028eb5659869e77981781f0cbad CVE-2022-47583,0,0,707f2cdab19bfa5285cf1bce776affd7887e366bd3220edb557a074f0fe1111c,2023-10-25T19:46:29.443000 CVE-2022-47586,0,0,9e6d0008a00adf0357bc05e23683b5e87a69def2fe444756ab63911e9bced78e,2023-06-27T13:52:24.327000 CVE-2022-47587,0,0,a76f98a79f6aa55a8e39607aafd2ac067b1f72911ae7a478fbba6ea62fd2e3fd,2023-05-16T19:06:11.433000 -CVE-2022-47588,0,1,3a444d609756502c83c2d83bf25240ac7c789e7683f2b911e52f7c98f197dbcc,2024-09-05T16:35:02.347000 +CVE-2022-47588,0,0,3a444d609756502c83c2d83bf25240ac7c789e7683f2b911e52f7c98f197dbcc,2024-09-05T16:35:02.347000 CVE-2022-47589,0,0,5e5d900b629606eb67c9181960f70fece43dfc9ac467920c50504cb91aad21db,2023-11-07T03:56:21.283000 CVE-2022-4759,0,0,71dd0fd35b7681e98fea353e60d1951250cc13d8c625e0bfac37dd78aac8700b,2023-11-07T03:58:49.920000 CVE-2022-47590,0,0,f8d07b1dd916c17de7d0fb6370862e3f4580e6c3718bb3cf08f6c586ca0d1094,2023-05-16T18:59:23.210000 @@ -212351,7 +212351,7 @@ CVE-2022-48822,0,0,504fa85be5a0659b456edd37017742da59d88f0b837d311430c41c5108ef4 CVE-2022-48823,0,0,2038485fb972a6fe90032e25ff6c2381b5cc1bc3476a14d2e6b20c51a52fde80,2024-07-16T13:43:58.773000 CVE-2022-48824,0,0,6f8b3f0b591d936628a1581d2dd1b0264c5b26ae4bf0dcdb9ef86915dc757fc5,2024-08-07T19:14:11.263000 CVE-2022-48825,0,0,1dcb20d69d4a0415522c61d45f6e1845fa453830212d7a6938b7be971e7ef474,2024-07-16T13:43:58.773000 -CVE-2022-48826,0,0,c6bf2c5b8218451f217750f1bf6da992131d1547764131df64578c302de688b4,2024-07-16T13:43:58.773000 +CVE-2022-48826,0,1,943fdb97f63f8307c0aff769185a02393f9e201fed809b48b399267c569c5a69,2024-09-05T19:36:26.513000 CVE-2022-48827,0,0,3446782c3e62971564a9355c4bbc5cae4a6fb0600ee84332219873a2ea76457b,2024-07-16T13:43:58.773000 CVE-2022-48828,0,0,ac153743f15b066043817b9138d32261bd420e1ace304e5973ea5a3268dd5399,2024-07-16T13:43:58.773000 CVE-2022-48829,0,0,0b9fc3c72c2d288457b35b41cb86e3a7ca9b6afb24b9db76af8fd157b4541e8f,2024-07-16T13:43:58.773000 @@ -212406,7 +212406,7 @@ CVE-2022-48873,0,0,126f5bc7205e96dcf9533a79fc89b99529bbfd5ccd8d6cb5c8905ec1069b3 CVE-2022-48874,0,0,b7c8e23068e04a991fde0d03cbdf1c4f3ccb10a413c897663da1c235e44314de,2024-08-29T02:42:02.070000 CVE-2022-48875,0,0,e2caa42e0dd6ec750fd9e46e92848849f463307e55477fd45d25751b4883f44b,2024-09-04T18:33:03.537000 CVE-2022-48876,0,0,dd7145c2e72a17454bb985d184ad79104309aabd2355fce75e49acbb3b771a5f,2024-08-29T02:41:34.627000 -CVE-2022-48877,0,1,d11f54e8721d999f4010dfed035c745a1f00d9c38d8712ff13d3d913ec9b5e66,2024-09-05T17:47:28.647000 +CVE-2022-48877,0,0,d11f54e8721d999f4010dfed035c745a1f00d9c38d8712ff13d3d913ec9b5e66,2024-09-05T17:47:28.647000 CVE-2022-48878,0,0,dc5ce0bd32b8ccb2332f1196b92e2e8459522ffb0a315cbb495d373067aaa0dd,2024-08-29T02:39:54.480000 CVE-2022-48879,0,0,d5d8344aef841ed4cf0ad0cf8bbf51494ab02f4264415fbe94c42e89bb1db8e0,2024-08-29T02:39:34.370000 CVE-2022-4888,0,0,b679e23092f1369239dc0dfe1d4aeef981e952b9db5ffb43ed815e206bd3f53d,2023-11-07T03:59:13.600000 @@ -214923,7 +214923,7 @@ CVE-2023-20698,0,0,725fd3f54be0034b5dd927b804dd5c07af977d3ce59c29d59141be3b76d8f CVE-2023-20699,0,0,d76c1f33dd6f295d2816cee3b61ba84bd8f1396a165e91797836e2aade8b5b67,2023-05-22T17:56:06.320000 CVE-2023-20700,0,0,d3d02cee88168788b222b43135952f8320e029d214772924441a66d4e89a2e98,2023-05-22T17:55:48.497000 CVE-2023-20701,0,0,bfda2dc01e7428ddc1c4937a195f6f8250e1e6598d79f4f89182a7dbe286de6e,2023-05-22T17:55:23.993000 -CVE-2023-20702,0,1,82310fdd9c7ffa4a9c1eb1fe20b53f8bc930868d3161fe00b098e8b462f46dbc,2024-09-05T16:35:02.980000 +CVE-2023-20702,0,0,82310fdd9c7ffa4a9c1eb1fe20b53f8bc930868d3161fe00b098e8b462f46dbc,2024-09-05T16:35:02.980000 CVE-2023-20703,0,0,d7595909793f635aeeb914d3cdd4961d4193b56e32519e1ba0a24e896173aea2,2023-05-22T17:55:07.977000 CVE-2023-20704,0,0,b2fcab781ed159f1088ac13b463eeb5d1bf35c6a3d6183e2fb8eae8366eba46c,2023-05-22T17:54:49.483000 CVE-2023-20705,0,0,996358ce65b8efc0919fb379cd4611952915919bdac829ca4a95a94b731ce2e4,2023-05-22T17:54:14.507000 @@ -217787,7 +217787,7 @@ CVE-2023-23928,0,0,8cec809a6ea1e183ef3864a8238df5fa0885b8b36886cf8c23f205e600d51 CVE-2023-23929,0,0,9fa43cc154e112d18276e30c8c23d333a61e73900ad58a05a0218eb2855d97cc,2023-11-07T04:08:06.713000 CVE-2023-2393,0,0,94e161db420399483064d273ecc9412c6e7471cdd249ed218a820212c6af368c,2024-05-17T02:22:56.353000 CVE-2023-23930,0,0,c4bd9cfa3052d18f889595f931403faea59f9abb597fb260a709b09caad8b1ed,2023-10-13T21:27:29.790000 -CVE-2023-23931,0,1,1c5887f017e1e95fdf5a7999a6a7f710494c087ff7799d31e8e15790fa8da006,2024-09-05T16:09:10.430000 +CVE-2023-23931,0,0,1c5887f017e1e95fdf5a7999a6a7f710494c087ff7799d31e8e15790fa8da006,2024-09-05T16:09:10.430000 CVE-2023-23932,0,0,8fc93077f43576d91932fe8251dc64b5a46a9c70591f52e4ec8785f398b0b922,2023-02-13T15:06:10.787000 CVE-2023-23933,0,0,c555aa865ab963013497233957e26f6d7dc5e28238e03fe01f862cc00e578f82,2023-02-15T15:55:59.113000 CVE-2023-23934,0,0,c2b426fab33075a561f0ab63966a75066763b2eecb66b9362156c34b28ff2e74,2023-08-18T14:15:20.553000 @@ -219177,7 +219177,7 @@ CVE-2023-25697,0,0,850bdc0b445737adcac3c2df5d7a1c5b49d3e27d7b30fd188b38487c111cf CVE-2023-25698,0,0,09d3f741592a2d751e1f39b5dcc9ec5ccc34a7da0de196ac5378bd69524d6974,2023-05-25T16:27:29.670000 CVE-2023-25699,0,0,2b97d86fa171c399b8b2276a7bb72273a6a4094537f7eac2d1488ba23e51b76b,2024-04-03T17:24:18.150000 CVE-2023-2570,0,0,bd2fc382d74bfaf72fe850ab558e75b4f27806b2417fb33843f201de6b2b95c0,2023-06-21T21:03:56.260000 -CVE-2023-25700,0,0,e9494be9341f330caf28b1e2697744bd7a57ff12ca2f2bf9e6d86345c5b41920,2023-11-13T19:52:51.423000 +CVE-2023-25700,0,1,c9141c6402cbafe90336ffabf58c2cd060d16821cf00e3e70f54a53fa15dcc0f,2024-09-05T19:35:03.447000 CVE-2023-25701,0,0,0e93a6f927271641bd40a74d4983fa0426262cd512e40482d2e55efae9782cc9,2024-05-17T18:36:05.263000 CVE-2023-25702,0,0,c79e71c1ee26bfbcd80fa2fa9e31073b5fd978ddcb0d64d662adec89ef78cacb,2023-11-07T04:09:08.173000 CVE-2023-25704,0,0,f73634d63e4d39958a974094b9630200196f9a7ce70260fb3f1e2a32ddeb195f,2023-11-07T04:09:08.310000 @@ -219280,7 +219280,7 @@ CVE-2023-25797,0,0,f72a0f10e728beb1cc623b4770de32d5c07002029f4e955537fc17e3db87b CVE-2023-25798,0,0,42532be5d77e3b45cc97a4c01f579642972ff8405981f5f740256874539262ea,2023-05-06T03:02:41.023000 CVE-2023-25799,0,0,753768c3a657d5a8ea036609be5b9245db756be326754c6aebb9a62e8b2779f3,2024-07-23T19:36:51.987000 CVE-2023-2580,0,0,b5e684d84cdf4e9731d817ba157eac17bc5477429c818a1e6cdf08de339a2410,2024-02-13T17:16:55.597000 -CVE-2023-25800,0,0,6e74edcaf364d8a1950ea18ed6f0cdb04224544b83adcecdee10a1949ceae813,2023-11-14T13:57:41.837000 +CVE-2023-25800,0,1,464fadd43820bfbb148a22dd65a64985cf48edf5d3e936e2e96a429b017b7078,2024-09-05T19:35:03.697000 CVE-2023-25801,0,0,f8f6d228f49cc7a082fd817609426a4b79246e3eb85aa277cf67dfd9931dacec,2023-04-03T13:41:46.390000 CVE-2023-25802,0,0,956c70fb596d4334ef5544c0d68169ca6d8fe068940e9eb13d71b02602336fc1,2023-03-22T19:43:55.913000 CVE-2023-25803,0,0,51328b2f952a4c3993fc70a9fa4f44ca2944b00268be6fa720a1e26c9fbf5c5d,2023-03-22T19:44:13.827000 @@ -219457,7 +219457,7 @@ CVE-2023-25986,0,0,74602cc16e9ba53b21a736390c0be57a4ed1a78c2bd053643c9221f3e49c3 CVE-2023-25987,0,0,900d6cf2dfbb307857e136154b2bddd76e867afd11bd5264bea24a279ec4eb06,2024-02-29T01:38:25.037000 CVE-2023-25989,0,0,e0d213e34d03bca7971e09caeea2d338e1b9b423446f34753c6280398a0676dd,2023-10-16T17:45:01.687000 CVE-2023-2599,0,0,81848b945aabf2ff4391c40d77c5923901fd105a658957d0ed29580eb3e5f724,2023-11-07T04:12:56.220000 -CVE-2023-25990,0,0,7a4b864e6c187ded315911752bf347149f12c0fb04ccc7370e4886dc9521e39d,2023-11-13T19:43:16.177000 +CVE-2023-25990,0,1,3df57060a8e3f122ec3e7bdad2f0d771121030140d26a047d206d5129d1671b3,2024-09-05T19:35:03.957000 CVE-2023-25991,0,0,7866d3b3b90b61a6bcec9808a7a5a3354e0417963a41d4a34ffc884752ea77e5,2023-11-07T04:09:16.760000 CVE-2023-25992,0,0,dedd9526b4cc4aa2fac06bc8e45b96344d65b2ad9559acfe7cee1bea7b3caa68,2023-11-07T04:09:16.847000 CVE-2023-25994,0,0,eafd10416155ec8db58c53a9e8a88d9a9649226f7b6136754c9357356d63c14b,2023-11-15T14:51:20.637000 @@ -221701,7 +221701,7 @@ CVE-2023-28744,0,0,529bccea15835710c0c9c9944e83caa4697594ba4bcb8387dc88516f3f630 CVE-2023-28745,0,0,4077396779187937e876f052f977693e97c1ad9916bfac808f29425cef580d74,2024-02-14T15:01:55.963000 CVE-2023-28746,0,0,4c132b6936203c5f531b4d2db122ae3f271cd0d64d8adc5e54dea8e2508f2d55,2024-06-25T23:15:21.940000 CVE-2023-28747,0,0,38e04be86bdfefeb33b6cdadd665ca402071c197c5a9626ad61e5698103411f5,2023-12-01T03:48:15.443000 -CVE-2023-28748,0,1,099462310b222c8c3eeb9044bd1359d35de6d38e7079c9bfbdbf3bc5e78860b5,2024-09-05T16:35:04.003000 +CVE-2023-28748,0,0,099462310b222c8c3eeb9044bd1359d35de6d38e7079c9bfbdbf3bc5e78860b5,2024-09-05T16:35:04.003000 CVE-2023-28749,0,0,4cf89dc3b5465df96cce5cc4e980aa464deaf57fe279e89d51a92042093adc1d,2023-11-27T22:08:00.970000 CVE-2023-2875,0,0,83dc4d39546eb611d54795208ec6f364b2d5166ce33a2367902e5e761b3aa2c6,2024-05-17T02:23:20.223000 CVE-2023-28750,0,0,5221eb4db9fe3c25974a6cbd82393532a60c97b7dc84a2ab2a1e87d8dacd8820,2023-06-28T07:14:55.810000 @@ -224487,7 +224487,7 @@ CVE-2023-32502,0,0,3fbd96bf98275daf9236c54a6b9df16c676b597aefea0b32be2e24304e51e CVE-2023-32503,0,0,1a7217dda2f352cea1561923bfc71534f15eca03a26b8012b2d60cbbf490b2a3,2023-08-10T03:53:30.737000 CVE-2023-32504,0,0,df6c10e59f3331d40e68039d006565ecd82d267d64b7b2057ed2ca576e7d2a4d,2023-11-30T04:57:38.217000 CVE-2023-32505,0,0,497f06bef942f6941d0d6e6f5a2598107f64867344c84fa7adc0c90412720e61,2023-08-29T15:36:07.203000 -CVE-2023-32508,0,0,01356319062eea883299da642dda3d0224e89267b3a0d91b81fbc4d357cb7155,2023-11-13T19:46:18.337000 +CVE-2023-32508,0,1,ef58274e86474d81cadd141d703c3dee3fc9663ffa93a612d90b59528f05f7f7,2024-09-05T19:35:04.203000 CVE-2023-32509,0,0,9b723f644dc1f9d43af04a72ce41ed78771577d456904af022935dac84e2b2c0,2023-08-29T15:35:57.153000 CVE-2023-3251,0,0,c8f9dd7fae41e4f94f3130e29ea31f1bba52bd28f23179132e6dee3c87da9d3f,2023-09-01T14:44:35.340000 CVE-2023-32510,0,0,7ae182437667707907b8544d44169e151de940154551c7465ba46eea332e4e18,2023-08-29T17:13:19.680000 @@ -224782,7 +224782,7 @@ CVE-2023-32814,0,0,4feadb463c76a88ab596897a43377e7f80236c0d7ca7b35eb9093f0abea1d CVE-2023-32815,0,0,f16706f2fd269f898840a89aa7b1bcfb374da64c42c50c54517b41ca6551d06a,2023-09-07T14:43:12.923000 CVE-2023-32816,0,0,7a04471efc725408a6350f3f95b518109cdf40c59f4923080fa27fcbf51a5d1e,2023-09-07T14:43:32.837000 CVE-2023-32817,0,0,0eefc6e64ac1fb050c23aa5a8e959801408488f7719380b8c36f2efe304c4646,2023-09-07T14:43:42.350000 -CVE-2023-32818,0,1,4098ce5220411201c4b71c4b2fdce0323153651a53296d9cd8a77499ae29ea31,2024-09-05T16:35:04.620000 +CVE-2023-32818,0,0,4098ce5220411201c4b71c4b2fdce0323153651a53296d9cd8a77499ae29ea31,2024-09-05T16:35:04.620000 CVE-2023-32819,0,0,9d9f2bebbbec48a4a545174b4c7b6940e40d0f4ee10643ff418b3ae0842a5ed2,2023-10-03T00:59:45.713000 CVE-2023-3282,0,0,0e6251dffeccf8739a49cde30ea439b2b5c25c72afba7998bc8e091c9b16349d,2023-11-16T16:26:39.977000 CVE-2023-32820,0,0,b40cf694dc4eb04fb67c024de91f368af35e1766f860ebe77c30faf160b2418c,2023-10-03T01:07:27.053000 @@ -224802,7 +224802,7 @@ CVE-2023-32834,0,0,4f00cb7a2be19f938eb5f63bc1e783890c9bb501803843b99e5fc4824ea46 CVE-2023-32835,0,0,6be2b1975c27c18e72ec78796008bf22ae0f278ae78e1317f92afdd688bf5492,2023-11-13T18:49:25.807000 CVE-2023-32836,0,0,aea62418b06d0586916f078559c5e18c589e6ec97a9e78bf2315c56b94c3fc3a,2023-11-08T23:50:44.607000 CVE-2023-32837,0,0,f9c1f42bce999ffec6652467879a223f1343ee548e41822db6ec1ad3615cd36f,2023-11-14T03:15:08.797000 -CVE-2023-32838,0,1,46d27b13ffe58b7bf8049c3c733c5280fdbe9a68139eb7d148ea74ebc52b6b95,2024-09-05T16:35:06.560000 +CVE-2023-32838,0,0,46d27b13ffe58b7bf8049c3c733c5280fdbe9a68139eb7d148ea74ebc52b6b95,2024-09-05T16:35:06.560000 CVE-2023-32839,0,0,e1ccc9f7ce83a8ad99f8cbafb8516480e2a5dfe028121c0a1afe235c1061c26f,2024-09-05T15:35:06.927000 CVE-2023-32840,0,0,d97af27e8e4f8e647e7feeffe747a3e1ea45a6c614d4f9bf4ee6aed67b8395b5,2024-09-05T15:35:07.837000 CVE-2023-32841,0,0,43f55b30afe43285f2f4e9fe29fe92c036eca7b5e64a3c18b5a564f9db4bfa4f,2023-12-07T17:34:09.690000 @@ -225848,7 +225848,7 @@ CVE-2023-34175,0,0,7963ca119069e22cd068e6449c8cd443056ac7293aef38a9a5ab07f40a61d CVE-2023-34176,0,0,b738483f6b56696346581488fd1b3c8068f32267b14cc9baea667c6a16887453,2023-09-01T19:24:19.840000 CVE-2023-34177,0,0,23d025a1dcb53941a3cc9b91a79c734c23a65a03ea7a1b71a0ca0ed20cca561c,2023-11-15T02:25:03.337000 CVE-2023-34178,0,0,aca204dae03900895fc5a1f61a6fbc0b06ecd629cc65cd03c3e5136c47447481,2023-11-15T02:26:12.223000 -CVE-2023-34179,0,0,510e9dceaa46cfeafa00ffdf089e9bfe03bf1bf16808817be2d14a672fc504c0,2023-11-13T19:51:47.503000 +CVE-2023-34179,0,1,d35fa6c9805a927bf5f03d77231a767f21f3276666d43500d6a1b3a01660d8c2,2024-09-05T19:35:04.667000 CVE-2023-3418,0,0,7e46bc99b22ce47256c55635958b1921f9373e8ddd402539a4927e0895b924e2,2024-03-22T08:15:09.497000 CVE-2023-34180,0,0,6269dd2b1494aaa327584f3f6730426e3eb6e91d34b8a118827da66130fc69b3,2023-09-01T19:22:34.537000 CVE-2023-34181,0,0,d681fc99921cea10f49b55f27cea230ac7b1eb156c9a25c8d82a83e941f80038,2023-11-15T02:26:04.073000 @@ -226057,7 +226057,7 @@ CVE-2023-34378,0,0,d0db587e672d29c22594b9c6449a04f13d77cad274d12604b932a4ef3bbaa CVE-2023-34379,0,0,12e74bb2b900839539dbfc3cf12772aa18833880fe9f8e45a58d843962f8da72,2024-01-24T18:45:01.177000 CVE-2023-3438,0,0,01ca2b9cb900d038224fcfd4a3c1725f14f1ba99292426381757980e36a7c633,2023-07-14T14:43:08.843000 CVE-2023-34382,0,0,109a28947ead22bf9a0b6c1735a6a82e2f3466e6baa3739d698708af3883640e,2023-12-28T19:55:45.243000 -CVE-2023-34383,0,1,8b35874cc16e57e446a5d4d10ab77e66997d5f22b1e9c24550da1c7f76c6a2b0,2024-09-05T16:35:07.860000 +CVE-2023-34383,0,0,8b35874cc16e57e446a5d4d10ab77e66997d5f22b1e9c24550da1c7f76c6a2b0,2024-09-05T16:35:07.860000 CVE-2023-34384,0,0,228bceeea50c06c9862391aab173eb1edfbfd1b8a61b99623ea2e1d79d708fca,2023-11-16T23:41:34.497000 CVE-2023-34385,0,0,02137400ce5e6d949084014a3603878bcd181b9dc9aef8acec440a9cf467db0a,2023-12-27T20:21:37.573000 CVE-2023-34386,0,0,ac5e2c22c4b1dfabd7a04e7bd99c4a33331127623013d46f2e896fb5dfff6218,2023-11-15T02:26:31.677000 @@ -227905,7 +227905,7 @@ CVE-2023-3724,0,0,2fa6be01c1145252c582f411440c2a5a84c3fb9a760ce172bd95481c2126a9 CVE-2023-37240,0,0,f345ebd65113bd4d4864666fd518aeb03c67171926f0463b95f543c65046773b,2023-07-12T17:01:20.263000 CVE-2023-37241,0,0,9fe0166316e0bc7537161ebf6fad184010e0f79fc056a5d8a8c07b19ba6aeae4,2023-07-12T17:06:37.770000 CVE-2023-37242,0,0,bb163f14af7b6c5a8da762cf17a59fabe7d458aac55844bd96b962e167085fc0,2023-07-12T17:26:38.483000 -CVE-2023-37243,0,0,20d3c406b00ddd3cb7e8bdc59aae3d63ed74e23b35a9be1577655efd4633e788,2023-11-08T18:48:53.687000 +CVE-2023-37243,0,1,3f9e8bd733470ad147b40614f42ed5c18baf25791cac6aab0d9caa71f8055cb3,2024-09-05T18:35:01.950000 CVE-2023-37244,0,0,f1637969580bc3f539ba65ab5117188a59279d018a665ed19b3d04e8e39190c1,2024-05-02T18:00:37.360000 CVE-2023-37245,0,0,bd864ab0bd880532f03169cc4f1d8ccd890dff7b47b676fb54a0d8f9a598e7b2,2023-07-12T17:26:48.683000 CVE-2023-37246,0,0,f17e42e14f79d6270e86dd423eee0433cb19441319151bfa66f60e0ddc9d2c21,2023-07-18T14:57:38.210000 @@ -228832,7 +228832,7 @@ CVE-2023-38321,0,0,2364897ad256a089e560a5c277aed13c770cfa4b8a1e46c7dada224576d9e CVE-2023-38322,0,0,77e7e3d5a563508f13f0709e4ee7c69fab03baa5a2bfa7bd6a08c1fe7dfa4b55,2024-06-20T18:15:10.980000 CVE-2023-38323,0,0,ad97029b16bc011eb71c7e299d2191bff1ba334035158326513bf24b95b2b0cb,2024-02-02T15:53:56.563000 CVE-2023-38324,0,0,996f612e0d755a728e6b16fc439b80eb300f664d281ae40ecab4678d08d1b776,2024-06-20T18:15:11.083000 -CVE-2023-38325,0,1,0b300e7d7d992565fe952ede42cf48d5190e256b49e2c83a479e6d519cb7c850,2024-09-05T16:09:10.430000 +CVE-2023-38325,0,0,0b300e7d7d992565fe952ede42cf48d5190e256b49e2c83a479e6d519cb7c850,2024-09-05T16:09:10.430000 CVE-2023-38326,0,0,6d00947a4d8e65431323d4bded79ddde12b58c8d8303c29367007396b0819b2e,2023-11-07T04:17:15.360000 CVE-2023-38328,0,0,3fdd0d7b92273a0af868b89414e7cec547ca2a9839d2e90f953da30982a8ede7,2023-11-07T17:08:51.110000 CVE-2023-3833,0,0,5fa3d7d06a864dc2983c58f7f3d6b7bec73c1a3e7a139d8bb3afc82942721017,2024-05-17T02:27:51.733000 @@ -229423,21 +229423,21 @@ CVE-2023-39039,0,0,47385f5e9b5ed13def18a31cf60e6a33ea7b074079d93ac445fb4e29d354a CVE-2023-3904,0,0,18f8c98b02c050d4df508a2e8dc4cff68b1f53b80a0c697873994607b33a2930,2023-12-19T21:41:11.020000 CVE-2023-39040,0,0,0d8786dd0c36fb996bae1c553c981aa3c7c75ac40c7d00cab157f9d00685f8a1,2023-09-19T21:24:29.890000 CVE-2023-39041,0,0,4d2d80ed29ee24b6cf6a78aa3d12d1c146d9a3291971e1efcab61cd8aac904b0,2023-09-22T22:46:09.727000 -CVE-2023-39042,0,1,a7a48f880646aadc134f0732e1d990e50286c7395769d5435f8dbb80591cc8d2,2024-09-05T16:35:08.263000 +CVE-2023-39042,0,0,a7a48f880646aadc134f0732e1d990e50286c7395769d5435f8dbb80591cc8d2,2024-09-05T16:35:08.263000 CVE-2023-39043,0,0,ba87098ff2bd45dc807c6b3c45c4d66fca97b5b793c3dc3373facd890703338e,2023-09-22T13:22:19.643000 CVE-2023-39044,0,0,50243e0bac844c04b7b4f63fd226a1af22956f7d9c562fd19fa07b15eb962106,2023-09-25T16:36:04.260000 CVE-2023-39045,0,0,57f8d443ae49abb4059d194043c2165dc9e6feffc529b819537bbcd4bb4e7744,2023-09-22T23:04:32.703000 CVE-2023-39046,0,0,143f854cafec6743bb41bfbb8e25ead3a2d45ac15cdc3b4a97748ef03fb13246,2023-09-20T20:49:29.943000 -CVE-2023-39047,0,1,330bee41b764040dd805e09cfff457ad69307d4794890a3decee0e8a8207a24f,2024-09-05T16:35:09.043000 -CVE-2023-39048,0,1,e78542bc4874a647db5adf59501a708f98fb1b693a6bb7216920949ea0533622,2024-09-05T16:35:09.877000 +CVE-2023-39047,0,0,330bee41b764040dd805e09cfff457ad69307d4794890a3decee0e8a8207a24f,2024-09-05T16:35:09.043000 +CVE-2023-39048,0,0,e78542bc4874a647db5adf59501a708f98fb1b693a6bb7216920949ea0533622,2024-09-05T16:35:09.877000 CVE-2023-39049,0,0,809254c4165396ed66f5a32dd34a4aab6595e82531f077d332dff6cf723a8a62,2023-09-19T21:24:54.373000 -CVE-2023-39050,0,1,e7472c093b9dc2c1966019ab015bbe60ef31b5b90f7d5b9c82a9f6bc68317138,2024-09-05T16:35:10.590000 -CVE-2023-39051,0,1,90f5c92359e58c527fc9bc86c4114f487c8b1eb26e7cbfeab808968e37b970d6,2024-09-05T16:35:11.323000 +CVE-2023-39050,0,0,e7472c093b9dc2c1966019ab015bbe60ef31b5b90f7d5b9c82a9f6bc68317138,2024-09-05T16:35:10.590000 +CVE-2023-39051,0,0,90f5c92359e58c527fc9bc86c4114f487c8b1eb26e7cbfeab808968e37b970d6,2024-09-05T16:35:11.323000 CVE-2023-39052,0,0,536097665e44ef3aaf6c6293891a2c7b53d3caa21ca8589186bd6edc5f8ecc75,2023-09-22T23:03:03.047000 -CVE-2023-39053,0,1,4128e6ce1aff3fe19dea6d73ba32021ef8d79cc7cb49183324271d2c30a9e6c3,2024-09-05T16:35:12.070000 -CVE-2023-39054,0,1,f833ae43e0ade72388da1f9c7c8f6fb4e7cdfde8ad9a67b03dab336fcef592ff,2024-09-05T16:35:12.807000 +CVE-2023-39053,0,0,4128e6ce1aff3fe19dea6d73ba32021ef8d79cc7cb49183324271d2c30a9e6c3,2024-09-05T16:35:12.070000 +CVE-2023-39054,0,0,f833ae43e0ade72388da1f9c7c8f6fb4e7cdfde8ad9a67b03dab336fcef592ff,2024-09-05T16:35:12.807000 CVE-2023-39056,0,0,a31be9e1f2f2ce024577389a44b0d64791d4f8214fe68fa844dd6e3e825d2389,2023-09-19T21:25:03.967000 -CVE-2023-39057,0,1,601d99c09f27b5ba170ec8ad96aa1bdfa16724520be499f1107219c96e2eca70,2024-09-05T16:35:13.513000 +CVE-2023-39057,0,0,601d99c09f27b5ba170ec8ad96aa1bdfa16724520be499f1107219c96e2eca70,2024-09-05T16:35:13.513000 CVE-2023-39058,0,0,c859360d758c635b4461bde9305dfc7f921e430c4f43b04685530cd4ee9bde54,2023-09-21T19:33:37.093000 CVE-2023-39059,0,0,d03db2419f848e834209670dfaa88b40205ec6bc4b60cbbbae6e240d2976015d,2023-08-30T00:30:06.513000 CVE-2023-3906,0,0,0ea4f9c458c7cefbf14811ad5f7e6a91096f5efdcc77090d83066140a3405bde,2023-10-02T19:42:18.340000 @@ -230326,7 +230326,7 @@ CVE-2023-40210,0,0,60a5bb02d33834744ff428dc03bc8b138087526b73a6de2bf384515860cc4 CVE-2023-40211,0,0,90d90f15c7908c3544489463e01f7d38118d9e507bdaa12327d24f32fc82671c,2023-12-06T02:13:10.963000 CVE-2023-40212,0,0,d931e8728b579ce5dd3f1ca7a4c02e8fe3536a548e769049a7d5288d3a75caa0,2023-10-06T15:38:56.077000 CVE-2023-40214,0,0,e20c4c7e56b855d0a2aaecbf93a20748002bd7f9e981ee090dbe0a73efe3c771,2023-09-08T06:48:16.773000 -CVE-2023-40215,0,0,329b7f89bf0636d3a457c7e6f71b300e37a7d3269e739f0a1ad0895c583637d7,2023-11-09T20:07:44.523000 +CVE-2023-40215,0,1,62940a0b7f18b4a94e81136228dd6cf4e7fda020a2102207aa5fe7be29940d5d,2024-09-05T19:35:05.073000 CVE-2023-40216,0,0,4fb96021de68f13f3910ea987866d0b68a7bd0fc4838409916120837870f2767,2023-08-23T15:21:05.607000 CVE-2023-40217,0,0,ea2a814671493f36a103d428e5914de530f63b17d41b4101012580f8eb2c7df6,2023-11-07T04:20:09.013000 CVE-2023-40218,0,0,7136f2a15ff264cf45d7688a6af026004a941b472bcc7e1da117ec6bc42d2900,2023-09-14T00:45:00.417000 @@ -231418,7 +231418,7 @@ CVE-2023-41648,0,0,6bf651288f8f48d6e7bd0f570ddccc7da1115d082fe9c3d770b06ce04a797 CVE-2023-4165,0,0,36ccb4130cb92f45a9d556a87456881f35e8a84734e25bd9e08f38366da9027b,2024-05-17T02:31:22.977000 CVE-2023-41650,0,0,7f0878d5215600ba1fe3710754f7196f1e8eb146c52dcba3f3c83482570f4774,2023-10-10T19:22:25.553000 CVE-2023-41651,0,0,94c1855905b63ab77edff2e6e03253ec5f10a5237438fad9e6016428e112c196,2024-05-08T13:15:00.690000 -CVE-2023-41652,0,1,baf8b9b6138f449fd5e2675d3c07ebcc8095795c237dc7dbc3dc81f9fe43d000,2024-09-05T16:35:14.493000 +CVE-2023-41652,0,0,baf8b9b6138f449fd5e2675d3c07ebcc8095795c237dc7dbc3dc81f9fe43d000,2024-09-05T16:35:14.493000 CVE-2023-41653,0,0,773db479f5a2ca70f292bd8c81a8aeb9abf5c2ce2c7df7c46a234553abfbb0d8,2023-09-28T17:16:29.787000 CVE-2023-41654,0,0,765aed3c6658d9e8b70c7086a6781d9ab11b9ccfc344a9188472c21d7e2c0251,2023-10-10T19:22:19.100000 CVE-2023-41655,0,0,956921e0c1b29ffa4676ec1d5558f455e7197781484fd40c463aab65a651b178,2023-10-02T19:32:07.347000 @@ -231449,7 +231449,7 @@ CVE-2023-41680,0,0,cf992c9691cd7d432af5c0a22c6a426a9e77ca49df5eeb9e03e61a243011c CVE-2023-41681,0,0,c7021d8fbcb8186f85a9c19dbf989d6be720331b94d4b0edf626b2e96e755bcc,2023-11-07T04:21:04.867000 CVE-2023-41682,0,0,f9029ae088ce0bf59d50c5cc7af84e437a4e0d9b07d3cb88c61e197f53cc9629,2023-11-07T04:21:04.987000 CVE-2023-41684,0,0,9eed5083559421b8e7d7641415df77b822264027219368c68e14e85659bf50ac,2023-10-12T18:41:06.240000 -CVE-2023-41685,0,1,e2cf814898c6e3999ac8db49f2329b5fb7e40b4826eb24d428b0a0ba0633a93b,2024-09-05T16:35:14.713000 +CVE-2023-41685,0,0,e2cf814898c6e3999ac8db49f2329b5fb7e40b4826eb24d428b0a0ba0633a93b,2024-09-05T16:35:14.713000 CVE-2023-41687,0,0,cec4570e0965e0fc537e7535f556ed487f76102fa4391af89db5d9441375b0db,2023-10-02T20:05:38.330000 CVE-2023-4169,0,0,799e75d71fa3c66ce536b52dc7d55f4708278d1be0ceb0cb8355a76c08ec58a1,2024-05-17T02:31:23.410000 CVE-2023-41691,0,0,34c26b6e65a7c8ea730805c930d8e698bc37a764e8fcac387285454fb330eb39,2023-09-30T02:16:37.970000 @@ -232141,7 +232141,7 @@ CVE-2023-42651,0,0,8d59f1302a332b4472bb8786413f0b6123a904112d9c92fff603507f06d30 CVE-2023-42652,0,0,ae0c416b51e22f5f35191d6b7e099f30e23aaa20614c4c57b9860425ac86e927,2023-11-08T03:02:36.173000 CVE-2023-42653,0,0,7e2620958435beaeeb0198711116ff5972d64b549b68c57d96d74362d00245dc,2023-11-08T23:16:13.907000 CVE-2023-42654,0,0,cfd37bb95f0260279cd98f4f6efb8c9d152b39db4d043ae520daa2503945d64b,2023-11-08T03:18:12.517000 -CVE-2023-42655,0,1,31425f99b2628a0aeaae68129310f19017bb5df8a366427dfa34420962ee7fef,2024-09-05T16:35:15.060000 +CVE-2023-42655,0,0,31425f99b2628a0aeaae68129310f19017bb5df8a366427dfa34420962ee7fef,2024-09-05T16:35:15.060000 CVE-2023-42656,0,0,c5fc94e487b562311db6aee24b16abe85085f853bd339a39183303f35808a206,2023-09-22T18:32:05.967000 CVE-2023-42657,0,0,26d28baef309543e0ff59e3d862dc6661f6e05a76145c5b4ff6ae3e21c85ba64,2023-09-29T14:34:24.630000 CVE-2023-42658,0,0,4c2c6607912f8952d09a8b68577f46c62f1d97b2e6779e6b5205791f4c006ad3,2023-11-08T17:38:06.957000 @@ -233628,7 +233628,7 @@ CVE-2023-44998,0,0,f6c45e83b122f8e819355d1b2b29ddd09138f4401f0489e9bec412c624027 CVE-2023-44999,0,0,d3cf023e5e2c41519939ca627d71c8b76bc76b6e3081ead454f70ce5c6cfdaa3,2024-03-27T15:49:41.437000 CVE-2023-4500,0,0,826061b7b404f2e0f4a524e3baee1d94bf9f75a68a4ea3e6777eb48c4f1c5974,2023-11-07T04:22:40.307000 CVE-2023-45000,0,0,6250955f44036735f67b9334307aeeab848f6c6db1e433430d10560275e6c2a3,2024-04-17T12:48:31.863000 -CVE-2023-45001,0,1,21e0dfa5e2dd0f57c60ccb75d3430330f2fd1e1d210ecc0ddcb35bc72a00f1b2,2024-09-05T16:35:16 +CVE-2023-45001,0,0,21e0dfa5e2dd0f57c60ccb75d3430330f2fd1e1d210ecc0ddcb35bc72a00f1b2,2024-09-05T16:35:16 CVE-2023-45003,0,0,fb850b1e5b9a06c73ff085d3a202e2eeb1cef10829b1f8b4d0ffc868fbe9f1aa,2023-10-20T18:08:51.807000 CVE-2023-45004,0,0,bacaab19f56bdb5d4bc6299bb435607202f05bd30e440b8c33a6b65f7a98f0e3,2023-10-24T17:13:10.327000 CVE-2023-45005,0,0,f8b28828bdcec002a31dc3b8afb20503633e1e34fb16f600fb4d12cf9b9a5f26,2023-10-20T18:11:32.280000 @@ -233664,7 +233664,7 @@ CVE-2023-45041,0,0,b61ff560cd80d1443c9826e47ee3b8f1433252a8302d31a2da68348886a52 CVE-2023-45042,0,0,a008f07831aca781d9531ebd3b99947832f11cf626f27712a786c08077d5e5ce,2024-01-10T16:57:07.187000 CVE-2023-45043,0,0,7f3b59f56208b2cd6e6aae2bbb5cf8c0ce492014e32bcbbe30f3e44e905e58bb,2024-01-10T16:54:50.930000 CVE-2023-45044,0,0,750980ec05121b72a03d567c061b34546235f9d21583d091e8f34706b772a00a,2024-01-10T16:54:34.517000 -CVE-2023-45046,0,1,d8758727abf6db35618ce2b0ca1174bb63c8ca1cf9840eb1534c8deeb6438f6d,2024-09-05T16:35:16.210000 +CVE-2023-45046,0,0,d8758727abf6db35618ce2b0ca1174bb63c8ca1cf9840eb1534c8deeb6438f6d,2024-09-05T16:35:16.210000 CVE-2023-45047,0,0,c0bf566680660866f4739c2e0ccc3b8918c4bb7f99c268c200f275a844481e59,2023-10-14T02:19:12.007000 CVE-2023-45048,0,0,34d43cc59fc387752b3cac2b6878f885266be8623b1dd5a911e51cf1c3bfb2c1,2023-10-17T18:40:47.370000 CVE-2023-45049,0,0,61eecb641451b335bbf01e438e16a434f293dde10c100a944001b6204a0e789e,2023-10-25T17:38:26.757000 @@ -233674,7 +233674,7 @@ CVE-2023-45051,0,0,756ca67263178a38fe29b94a76b9769b4f15dee1bc0d6427286f626cebd18 CVE-2023-45052,0,0,d0a968b6501702e331f836f9e9d8203debdfcf394fbe5d3f6cf355977f5ba33e,2023-10-17T18:46:40.420000 CVE-2023-45053,0,0,5346506130a390e5bbcca703318288a00029d8f999c4501d8f3da2fb158bf992,2024-06-04T16:57:41.053000 CVE-2023-45054,0,0,1773b7afb8473e4efe890b70f20cc5144958a667e023ae470376ffe710857526,2023-10-25T17:38:17.183000 -CVE-2023-45055,0,1,a01521a7d8f5121fefcd25ef5ce91dbfe841289941c84fb8bbc4393d9f3ef041,2024-09-05T16:35:16.437000 +CVE-2023-45055,0,0,a01521a7d8f5121fefcd25ef5ce91dbfe841289941c84fb8bbc4393d9f3ef041,2024-09-05T16:35:16.437000 CVE-2023-45056,0,0,ae9a02691dc6a81399179bb5e23557346136ed37e975b571aacbdfe52b2bee21,2023-10-25T17:38:11.073000 CVE-2023-45057,0,0,98ee00a19d21c741ad3d33e12cc68e459ece35cb5e0997701bdb880f5b4ac73f,2023-10-25T17:38:03.887000 CVE-2023-45058,0,0,41f62f3fc0adb134a627eff17322b3f15873ee6a85b3fec9e181558c2f76f459,2023-10-17T18:58:04.030000 @@ -234091,7 +234091,7 @@ CVE-2023-45653,0,0,3e2d48b181c48be89173149374633ab541ada0ea7d9db20e97b7bfd05db9c CVE-2023-45654,0,0,7c4975b33eb319f9537ba636fb85599904fa1b6d957949d5c8c9d1617b04c0f1,2023-10-19T17:30:30.677000 CVE-2023-45655,0,0,c6f0a17b1dbce0b7177a6ab2271281b9c0fb79f9e9ffefae8c2e9192c95e0c43,2023-10-19T17:56:36.927000 CVE-2023-45656,0,0,af75069100cd97d6cda2be03886d1cd3582bc4d7d31d7756e932081b5e5b79b8,2023-10-19T18:07:45.763000 -CVE-2023-45657,0,1,7ef36b392d896a83da5b84fbdb1e9d50712da7a7ea07a6b0225affa77ce09f17,2024-09-05T16:35:16.643000 +CVE-2023-45657,0,0,7ef36b392d896a83da5b84fbdb1e9d50712da7a7ea07a6b0225affa77ce09f17,2024-09-05T16:35:16.643000 CVE-2023-45658,0,0,5bc5f104aa10958fb6d1e8357fb33f601a3b45a510309f1a91406ccfa1281fb6,2024-06-20T12:44:01.637000 CVE-2023-45659,0,0,1b2e580134a0f7d62c2b51bb4c0851afff2f4355af9eac646fdb90d7414a42f9,2023-10-30T18:03:57.393000 CVE-2023-4566,0,0,874f9eed87304bf938613d4a0d2d96c53db7503829c6d29e9ced7593c9da0424,2024-01-19T16:12:13.313000 @@ -234409,7 +234409,7 @@ CVE-2023-46077,0,0,113ffd1ba435dbfafbdacbfe80e86010c4d2131a7efc775c70b54ff59b0f4 CVE-2023-46078,0,0,cb745203ade48e48f064d52933c22c5ba3e80c4c1bff415537d218d84ed92c3b,2023-10-27T19:33:21.057000 CVE-2023-4608,0,0,bce34d36d9c20677a08a64cd956212f83ea8fd04b1f582d275913bcce839deb1,2023-11-07T19:15:44.413000 CVE-2023-46081,0,0,cd53552ed7abc207ab09d018e27339211db75578b722c62784706c0bbfed1599,2023-10-30T16:29:47.100000 -CVE-2023-46084,0,1,baa8b5bc8952b98256a22e47f3ea34b0f723fcb5d229b9c87003865eff8e4cd3,2024-09-05T16:35:17.453000 +CVE-2023-46084,0,0,baa8b5bc8952b98256a22e47f3ea34b0f723fcb5d229b9c87003865eff8e4cd3,2024-09-05T16:35:17.453000 CVE-2023-46085,0,0,9dc4c2f5c683d49b05b7d8b97a6e8ece306b0768582fb10edaa3cdccb50d784f,2023-10-30T19:29:46.057000 CVE-2023-46086,0,0,8b579f5a7315305a342f8a15fcea16ca5b391d7ffb7c2326d32cfdc260928f1a,2023-12-06T00:39:07.323000 CVE-2023-46087,0,0,8fc482c1e0ce144644419fd37959e19dbd6783827ba3100e4c454e1da27ff61d,2023-10-19T20:16:43.900000 @@ -234643,7 +234643,7 @@ CVE-2023-46358,0,0,e91b798a6d804dfbf2166c757d4765c917e819dd48ede964ba18ef7c646d1 CVE-2023-46359,0,0,be603d4c0e5d02fe4301ed7c0c3697ffa521735da6db832b1993bcd1a2907405,2024-02-13T16:06:48.480000 CVE-2023-4636,0,0,0a8908ed53b282884073cf1159c75f04520678616413932f50206626519e8e5f,2023-11-07T04:22:48.493000 CVE-2023-46360,0,0,15b7a0bfab198a40fa51898875d8715bef48ca2dde4b0a9c26bf4f4c0eae3a96,2024-07-03T01:42:03.253000 -CVE-2023-46361,0,0,6566005f37b3b81cce124758e1aa16ad83da42a1c4e3dd83e0552b0fbb29c5a1,2023-11-06T19:26:57.803000 +CVE-2023-46361,0,1,2819a8ef438956981ad5022522b317523d7f02a9858ff9eaccabf216ab3c5df5,2024-09-05T19:35:05.973000 CVE-2023-46362,0,0,6de7c4e3de78a15cc4cee39eb5908a6649732d0266f5e09709a4fca63247c911,2023-11-15T19:49:17.137000 CVE-2023-46363,0,0,88add742026dacb9c5fb0ed25051b79dbf420bfd9e4dc44f99319d2fa0e9f430,2024-09-04T15:35:14.107000 CVE-2023-46369,0,0,05f430621e20b438c901b498a04c3792c3a816c2ac20590971f8b20317024e04,2023-11-01T20:03:48.360000 @@ -234960,10 +234960,10 @@ CVE-2023-46771,0,0,ff7e8107056ac40d3a75affee781a6f0b6057f1a67f4262c626e5326a010e CVE-2023-46772,0,0,0dac565abf640461f2d329b6c68e8308bbc45aba4a38448b0c8d502a445ad2f5,2024-09-04T19:35:07.837000 CVE-2023-46773,0,0,ca9bcc99fc127ca69b0a6c672aebe92fd6468c81b50651408fe18f527dbc3d5c,2023-12-11T16:14:54.787000 CVE-2023-46774,0,0,e069ad0656ced8cb8a3e80bcd64bbf8dc3e14daf29ef1e512ab38211ed7d6ed6,2024-09-04T20:35:10.633000 -CVE-2023-46775,0,1,cd02bc19884781a7989d5c489146831133ae45a35b380d030d4c6ba277a6b928,2024-09-05T16:35:17.790000 -CVE-2023-46776,0,1,9c30b4fda47a3f731339000c1bf8f5493340341fb5291e3323035e0727204280,2024-09-05T16:35:18.017000 -CVE-2023-46777,0,1,13e34ea99551bfa30a90363cbaf68d0f00e1dbb7938a0367b34dd70cf203dddf,2024-09-05T16:35:18.237000 -CVE-2023-46778,0,1,91cc5159857274c4d34b400e32efa3ac951dcd5180258fbf86ac0c129a8da81c,2024-09-05T16:35:18.537000 +CVE-2023-46775,0,0,cd02bc19884781a7989d5c489146831133ae45a35b380d030d4c6ba277a6b928,2024-09-05T16:35:17.790000 +CVE-2023-46776,0,0,9c30b4fda47a3f731339000c1bf8f5493340341fb5291e3323035e0727204280,2024-09-05T16:35:18.017000 +CVE-2023-46777,0,0,13e34ea99551bfa30a90363cbaf68d0f00e1dbb7938a0367b34dd70cf203dddf,2024-09-05T16:35:18.237000 +CVE-2023-46778,0,0,91cc5159857274c4d34b400e32efa3ac951dcd5180258fbf86ac0c129a8da81c,2024-09-05T16:35:18.537000 CVE-2023-46779,0,0,fb8dd4588744165f72717c6f7064a9d35a0fc366824ae88742f0b14ef2388494,2023-11-14T16:23:35.977000 CVE-2023-4678,0,0,38248279f2fa62a8482191e3a53fbfd6c141788a325046ef84e5cd7c6951e6d6,2023-09-05T16:25:18.257000 CVE-2023-46780,0,0,0536a1d17e54dea2e10342aada2843adfc4a23b9b52a8f274b4302542fae52d4,2023-11-14T16:23:28.687000 @@ -235007,7 +235007,7 @@ CVE-2023-46818,0,0,f234f9e3a48282f81299c3ff6ed7b1a1d071eb6e821f675508ca8b30a7e7e CVE-2023-46819,0,0,b9144c8b43b7e50be02f0a7adb87559b3a81cc8b960f11a9c9b61dc6bebac590,2024-09-04T19:35:08.043000 CVE-2023-4682,0,0,c1c0d3bcf2f406c6bcb06b0a440260f9dabf84e5ad23fa025bbfa655e8c647fb,2023-09-05T16:24:54.687000 CVE-2023-46820,0,0,aa393ad58ea962d201742c7c0922f5354d3e88c5c877ebf040d42c8c1854c0a0,2023-12-06T17:29:13.157000 -CVE-2023-46821,0,1,b9ae41bf73dc8c4d515dffe86f079303167a84f4c65b46ae0b6be2ddb87f9d76,2024-09-05T16:35:18.747000 +CVE-2023-46821,0,0,b9ae41bf73dc8c4d515dffe86f079303167a84f4c65b46ae0b6be2ddb87f9d76,2024-09-05T16:35:18.747000 CVE-2023-46822,0,0,8c05d50ce279914b9368614ca9374ab94d572c57106adaeb969171d9e37b0bc1,2023-11-14T17:05:20.447000 CVE-2023-46823,0,0,838996d884d75f252032956fee2566dbd07b3e32228ec936beec7708a42ee70d,2023-11-14T17:05:47.417000 CVE-2023-46824,0,0,e6fd14c677d2928a78738bda0cb11b0c31e9600c7371df7212465bdfb458e0aa,2023-11-14T17:05:13.743000 @@ -235249,7 +235249,7 @@ CVE-2023-47177,0,0,fdca9aecea882266a46004c6f5c24cc4c8a1a12b8670913d232d4092578a5 CVE-2023-47178,0,0,86f510c83613716e8f6a022be6a02e2beb32ed09a61a6b2eab7f5b7cb2dcf49e,2024-05-17T18:36:05.263000 CVE-2023-4718,0,0,b03d0f7acfe699b0ac20de2a399cf8afe19aca9042668571b8871cffdd0352d1,2023-11-07T04:22:53.677000 CVE-2023-47181,0,0,3dc2ca3ba78467f5ca9480d1c4743c913cb482b9d92370c750a2f20f50ecf96d,2023-11-15T17:31:40.323000 -CVE-2023-47182,0,1,85fcb91c870e2334633467c6bc6ee8fc4a29a3a885f25d1406309244f9dd5ced,2024-09-05T16:35:18.960000 +CVE-2023-47182,0,0,85fcb91c870e2334633467c6bc6ee8fc4a29a3a885f25d1406309244f9dd5ced,2024-09-05T16:35:18.960000 CVE-2023-47184,0,0,0e34483beb08ccb1705267d4deffbf80344ddf7ad18151e69346821974010f90,2023-11-14T17:04:27.783000 CVE-2023-47185,0,0,31d0ed95ef79eb7f0380ae191ec187467609370f123f9ca972b43bb5e4c6eb08,2023-11-14T17:04:12.320000 CVE-2023-47186,0,0,bebfc46319f229be3067c1071524052c7ba3b45f40025f4ace9bbd6b4fac1423,2023-11-14T16:23:05.433000 @@ -236602,7 +236602,7 @@ CVE-2023-4908,0,0,2157a1992986fbdb556ff3b644e13f19766c3aff76203a54b7f145a49dc7ed CVE-2023-49080,0,0,78bcfe48eb6e40c7b429674a2a599644b879fa688721a08bda1a08d7d7897b45,2023-12-14T03:15:36.243000 CVE-2023-49081,0,0,8fa769ede6f9fa1ffb05b8bf5929ed5fc24808c793c96bf2da8d1c711710cdca,2024-01-29T14:15:08.373000 CVE-2023-49082,0,0,68c06e42bbd9df7a51655743e033791cd35243155ed9ebf100c9c773fb9d2e4a,2024-01-29T14:15:08.580000 -CVE-2023-49083,0,1,3dd46686ff8f9453426b69f56a07285783aeceaf52630ca5e49644ff03c7c3fa,2024-09-05T16:09:10.430000 +CVE-2023-49083,0,0,3dd46686ff8f9453426b69f56a07285783aeceaf52630ca5e49644ff03c7c3fa,2024-09-05T16:09:10.430000 CVE-2023-49084,0,0,2f2213d16a3ce8be9409cefbf98b10505fab1cb6bbe5cd697ea6f6b6a59cf001,2024-06-10T17:16:15.150000 CVE-2023-49085,0,0,6a9bd4750d287dae816695df35b6fabd5f3ca1a04f47cbbf3222fc8327892b86,2024-06-10T17:16:15.307000 CVE-2023-49086,0,0,5e84115449ffcaccacec5822563c5d4c42dbf9c46fbbe9165fbda83eb336a989,2024-06-10T17:16:15.433000 @@ -237682,7 +237682,7 @@ CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edb CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000 CVE-2023-5078,0,0,df1630d406513e5e98f689a68136c5e13ac7072ff4d1809632880572b8c33161,2023-11-16T18:01:15.060000 CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000 -CVE-2023-50782,0,1,75e4b5549217f027f3387947d4db2096cb79eedec4a878f9b0a87ffba322d82a,2024-09-05T16:43:20.083000 +CVE-2023-50782,0,0,75e4b5549217f027f3387947d4db2096cb79eedec4a878f9b0a87ffba322d82a,2024-09-05T16:43:20.083000 CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000 CVE-2023-50784,0,0,310bd016f72a55e87952759915b2328751f88f7e5a355286cf6eeaceebb855b6,2023-12-26T03:15:08.927000 CVE-2023-50785,0,0,95069a7af58cd3ada76ed23cb42a6b26c34f9d8527e1cd720c0edc9a0997e9b2,2024-01-31T19:16:46.520000 @@ -238338,7 +238338,7 @@ CVE-2023-51708,0,0,0dfdbb5d7cb1389f759816e9ad4172bb998d429b0df64366077376582584d CVE-2023-5171,0,0,8948c3d814290078c1c43176052421493848da5536f54700b55247d4792fc4ee,2023-10-12T02:52:09.820000 CVE-2023-51710,0,0,79ce6e5c96d55165aab5c91dac2a06a015fe7d1749cae928be620bf7f109c0a4,2024-07-03T01:43:17.330000 CVE-2023-51711,0,0,f4ab5b198dd0eb861779e76dca93509630faca36266948295b7495303f7c685b,2024-01-30T21:10:53.387000 -CVE-2023-51712,1,1,c8ebea51f5725f79d9a2d66e527f595f0a0142f1b753aa0d944b15d999be8fca,2024-09-05T17:44:56.007000 +CVE-2023-51712,0,0,c8ebea51f5725f79d9a2d66e527f595f0a0142f1b753aa0d944b15d999be8fca,2024-09-05T17:44:56.007000 CVE-2023-51713,0,0,fdd6a3aefaeb63afebacb6e639ea6879a7a88ac0ffa6f2349591e85a6c3dc899,2024-01-08T19:06:50.837000 CVE-2023-51714,0,0,a476f3917c564d9c6b203fc32aafdf2c3833beb73f4e6eda8679d21661ce79ce,2024-05-01T01:15:06.390000 CVE-2023-51717,0,0,0e2a37f76ad2a0357193c8d2d90c0f37b2227f38264031d1f3750abc9dcb17d0,2024-01-12T15:17:16.457000 @@ -238451,7 +238451,7 @@ CVE-2023-5188,0,0,47762739b6751479a21ab981185ca1ef31278f06b02ae73bf3ad57ae8c1d36 CVE-2023-51885,0,0,5103353d33e982579269f9fb56a9bad1455804a5e3e1a1661d8fb1c7753bc485,2024-02-05T17:43:38.873000 CVE-2023-51886,0,0,17a987ce8e9d4293c97b1e144f14d734e91014c1a5c8636de0492c2716c2ca80,2024-02-05T17:38:03.287000 CVE-2023-51887,0,0,3617f2c6023aa853023bfe854b24cfedd6b5765a6faa2f3c4fe8d892cba62440,2024-02-05T17:29:49.697000 -CVE-2023-51888,0,0,369e4b59d939c973e084f50cffc09e969b7bc206baa705654a647f3deeb745c6,2024-02-05T14:11:51.323000 +CVE-2023-51888,0,1,9187ef2a1e845145b9da21ae72a5ebcb83ad50f0cdc421a41aecb6389d22b1d2,2024-09-05T18:35:05.327000 CVE-2023-51889,0,0,225f817fd8e1547554e8995f8a260965ee9dcf250964df6b70d82cef6d56e9e7,2024-02-05T14:10:48.287000 CVE-2023-5189,0,0,7b694aef270a6ce47662e66e7a2a3b55e831ccd30f652324b2adb2fa51e64855,2024-04-25T15:16:02.810000 CVE-2023-51890,0,0,dac6d98652777713b7321c29dc97b96542610ef74ace66a9064ce4a9f2192735,2024-02-05T13:57:15.610000 @@ -240449,7 +240449,7 @@ CVE-2023-6499,0,0,d7595712625304edad3fb1c2f9d5478d14099b9159008b78b4935b018c9679 CVE-2023-6500,0,0,b7e4b5707092c32691bd4884be310539cb3deb2e1b3476a4077fd0fa79e885c9,2024-03-21T12:58:51.093000 CVE-2023-6501,0,0,458ace5a018266421d15a37f407ed30a087034189adac3ac381201d7b8bbd71d,2024-02-12T17:31:21.670000 CVE-2023-6502,0,0,33a735850e20addde56371b1494c5d661c35430919497d38bc1de270f1bbe309,2024-05-24T01:15:30.977000 -CVE-2023-6503,0,0,5a3722ed249ea0520ce17d678a001cea99d368bce2c57440edc06fa38e339e56,2024-02-03T00:27:48.957000 +CVE-2023-6503,0,1,d218ad8473fec30dfcb16931ef46bcb78cf3da9a7f36a35616f1e55c784136c2,2024-09-05T18:35:06.590000 CVE-2023-6504,0,0,1dcc6bc3d1fde830086c7a2c14987af01f76f1d08b941e5de9c5ff386a21111f,2024-01-17T20:32:01.283000 CVE-2023-6505,0,0,955e7c9b3526c5e0ef905e5ccc980951b936c025336c6f775082388e73e61ca9,2024-01-11T20:02:39.087000 CVE-2023-6506,0,0,47b4e3cf97b2f53ec40c761a3043c76bcafe2ca9f6800f81c91351cbc08a6518,2024-01-16T23:56:05.073000 @@ -242143,7 +242143,7 @@ CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328 CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000 CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000 CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000 -CVE-2024-1151,0,1,4bd96d45d8577f9810851348ab4eeb008c26399957744dd5c6d2cb4a43cb1738,2024-09-05T16:15:07.097000 +CVE-2024-1151,0,0,4bd96d45d8577f9810851348ab4eeb008c26399957744dd5c6d2cb4a43cb1738,2024-09-05T16:15:07.097000 CVE-2024-1153,0,0,f63803b078e32875d89d575d4b462673565a6d5cdf9ae1c5582d3c5142b3f8aa,2024-06-27T17:11:52.390000 CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138d1,2024-02-20T19:50:53.960000 CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000 @@ -244714,8 +244714,8 @@ CVE-2024-22438,0,0,c546f064f96022d9cfcb345a02091ae2e116d064186c8d0e1fc01e2de8eec CVE-2024-22439,0,0,d7a7b572beee53b66512fc19be17c3d6cb68344acbd1d99f9e2956209263c65c,2024-04-15T13:15:31.997000 CVE-2024-2244,0,0,41aec355f079deb3c815718a9277f010e5e21c50317c0cc2fa902ffd2d6d5133,2024-03-27T12:29:30.307000 CVE-2024-22440,0,0,3d70b2afb8c1daefa939392497f652da82a7db6224ab8e08ddbf5f360293d915,2024-04-17T12:48:07.510000 -CVE-2024-22441,0,1,b624581828dca72606ce8eda6c6382b6dd6de672924291674c98df7718b61e7b,2024-09-05T17:42:43.337000 -CVE-2024-22442,0,1,466e9dae5de9dd0d6abffd7401018ab4afc624390239247802cfe4eb99ae2e28,2024-09-05T17:12:12.433000 +CVE-2024-22441,0,0,b624581828dca72606ce8eda6c6382b6dd6de672924291674c98df7718b61e7b,2024-09-05T17:42:43.337000 +CVE-2024-22442,0,0,466e9dae5de9dd0d6abffd7401018ab4afc624390239247802cfe4eb99ae2e28,2024-09-05T17:12:12.433000 CVE-2024-22443,0,0,27a67673b7c0ae8982f980390674c80990ca93968fa9f3b73c7d5ad9ff61d8d2,2024-08-01T13:46:57.173000 CVE-2024-22444,0,0,1378366e0b636efd3e2101cecabd93b96114212b319eff1d0d59da40fea2e792,2024-08-01T13:46:57.887000 CVE-2024-22445,0,0,a6af5c7306e37f1c831f19f1accec343bae2ff2fdb348ced0577263d09a6b8e1,2024-02-27T16:51:44.013000 @@ -245925,7 +245925,7 @@ CVE-2024-24498,0,0,0aa227dc68d56b6857000c562a4cac27071ca2f47030d798b9bd4912ab131 CVE-2024-24499,0,0,e4ff37cd2db9d4d32f1157041bef41498f67a3696e29884293222c73e4e39b9b,2024-04-24T21:15:47.147000 CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46e1,2024-03-15T12:53:06.423000 CVE-2024-24506,0,0,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000 -CVE-2024-24507,0,1,df900bfc618cee6fc96303e9e74a6c7f402219022adee42ced57945155073210,2024-09-05T16:59:07.437000 +CVE-2024-24507,0,0,df900bfc618cee6fc96303e9e74a6c7f402219022adee42ced57945155073210,2024-09-05T16:59:07.437000 CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000 CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000 CVE-2024-24512,0,0,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000 @@ -246062,7 +246062,7 @@ CVE-2024-24755,0,0,e4708ab22e90c108e98e9aa20d9e6f52aac9c365db4852f4f377c09577dad CVE-2024-24756,0,0,a8c8a136cbb94318b9ac39b1cf6ca26aedd9fd478d8deeb2b541a1b5348e8aea,2024-02-09T19:47:10.213000 CVE-2024-24757,0,0,cf8db7e707a60167d50958ed833b092b480adb19351f319a3150e724530329a6,2024-02-10T04:10:36.420000 CVE-2024-24758,0,0,4afdd9a8b1527f6df073ab9304d324073fd35a999bf5b108c831c515c647ab95,2024-05-01T18:15:14.833000 -CVE-2024-24759,1,1,1fc2ee80ff047419905c3bf79cf54eedd9e4196b456b6e433fbb1ed0279a73d6,2024-09-05T17:44:56.007000 +CVE-2024-24759,0,0,1fc2ee80ff047419905c3bf79cf54eedd9e4196b456b6e433fbb1ed0279a73d6,2024-09-05T17:44:56.007000 CVE-2024-2476,0,0,80675065379b57841f9cc91f89004ea3a59650c216e07d02b5d96eca99c32b3c,2024-03-29T12:45:02.937000 CVE-2024-24760,0,0,712e50ebe0dfd036080457db09cbfac631236bade7f3aab0fefe0bd1d6c7650e,2024-02-10T04:04:55.743000 CVE-2024-24761,0,0,b1f2bf902e5fec122e2292b6e3e60586d417fb53e3af18ffd9589198f195ec1f,2024-03-06T21:42:48.053000 @@ -248640,11 +248640,11 @@ CVE-2024-28073,0,0,cadc3783842c38ba6ba61a0c45fedc9b4d6302da33bfc50f751b346c540f6 CVE-2024-28074,0,0,d56a41836ab797c2c8dfc7594ed587b13dfc6a24515e66a335c46effbf12420a,2024-07-18T12:28:43.707000 CVE-2024-28075,0,0,acb66f607b88e170574f583eec5f7c1a4911ba67af1b2bf08e9d24973400217b,2024-05-14T16:13:02.773000 CVE-2024-28076,0,0,7c257d304897e65890bc306f57dddbb8d08174369e3efd3f8b92793bad3c8aa3,2024-04-19T14:15:11.080000 -CVE-2024-28077,0,0,05e3d3ecbdb0ca6ba2a68c8f8dd34e1892d6007f9bb748a6ad071a677edfd53a,2024-08-27T13:02:05.683000 +CVE-2024-28077,0,1,0f4ef74b4f05b498788e2d7eefa1ffc7fe991cc319e7b31a65cdacfea51880d2,2024-09-05T18:29:31.127000 CVE-2024-2808,0,0,e0d3d3b9e325ca6ee7276bd88e3baf37c479e9082bd582fafdd638b137fbd54f,2024-05-17T02:38:31.233000 CVE-2024-28084,0,0,0adeb03c9958c0a142a2b711719e67fc11a910aa963939e76d45a1c62626692a,2024-03-23T03:15:11.583000 CVE-2024-28085,0,0,eda19307ca318b29329ee67501b0a732155c41fd23b517fccac0883629e2c1d0,2024-08-26T21:35:09.310000 -CVE-2024-28087,0,1,7d1e7fc9998a545b97a99bde83eca225ea08b2d2bd96cb17f305adc67ff6c996,2024-09-05T16:15:07.437000 +CVE-2024-28087,0,0,7d1e7fc9998a545b97a99bde83eca225ea08b2d2bd96cb17f305adc67ff6c996,2024-09-05T16:15:07.437000 CVE-2024-28088,0,0,7621167029939a351662bffd11ebe0b64eaef26da83ba8e299fe7ca6c0872c73,2024-08-26T20:35:16.413000 CVE-2024-28089,0,0,8dcfc5f0af6bda2c62c3d6583b98af8806f63e5c3b009d2d4c4b9e591fef1377,2024-08-19T20:35:09.170000 CVE-2024-2809,0,0,82a495e20989f000a99f2c2b597fd459041cdf90f3f5905ac9eb213a6d9d3a11,2024-05-17T02:38:31.340000 @@ -252448,7 +252448,7 @@ CVE-2024-33657,0,0,4304e9ad6a833f4e772f3f337e66d35550f113c5280de638d62e655b681eb CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000 CVE-2024-33661,0,0,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 CVE-2024-33663,0,0,e1e5e3bf2bfb6f84f42175dcb29cc9799e837d7e631a8436167d9acbf72c8e21,2024-09-03T20:15:07.433000 -CVE-2024-33664,0,1,fa102b47e0b0f78985d310d8b8074ad26f7b0a8f6e346244359d7ca87f4b731d,2024-09-05T16:15:07.570000 +CVE-2024-33664,0,0,fa102b47e0b0f78985d310d8b8074ad26f7b0a8f6e346244359d7ca87f4b731d,2024-09-05T16:15:07.570000 CVE-2024-33665,0,0,5ca9bdea72a653edb26c9763ca65ae33540673cea00ec4859ff84abbb4dc8bf9,2024-08-02T03:15:30.310000 CVE-2024-33666,0,0,8e982c6a0c03f8b5d1cbd58e6d45d8ee40f43b5fb9ebc6cbaefdef7cc6467b9d,2024-07-03T01:58:33.837000 CVE-2024-33667,0,0,d9a60490b5a47ab58d6800af0e868d69fb5acbd4454834ffe597651ec1e47cdb,2024-04-26T12:58:17.720000 @@ -253163,34 +253163,34 @@ CVE-2024-34633,0,0,dcc919d4fe3cd88a5fcb40687da081e03a0a9de314e12214fe0ef228c52e1 CVE-2024-34634,0,0,ca7a7dede48188d5d254d269b40f8d801c38580350c32ea8a5414c109ee76db9,2024-08-09T21:17:55.090000 CVE-2024-34635,0,0,f315481fa1588ad6ec51d6f8cc1b6dc04d19bc1ee3f7f3e279e9f419b1b04cd7,2024-08-09T21:18:43.303000 CVE-2024-34636,0,0,6d289e439c66cba4f752a544d7ace1fe5b0d959e931f99945923c8bb0b32e8a7,2024-08-29T16:47:17.790000 -CVE-2024-34637,0,0,b2dbc5d3e2b8bd640acbcd8455d7cad1fdce5ceb29358ceadf517c157da6f558,2024-09-04T13:05:36.067000 -CVE-2024-34638,0,0,4f0cf4319f2fb0aa7c7dd8d320d63c19f79bc6f56a5ea09b417b10a258c83de9,2024-09-04T13:05:36.067000 -CVE-2024-34639,0,0,524dcf72795ba916828a0fb45debbb24e51bdef5371985ea7d095ff25c9b4343,2024-09-04T13:05:36.067000 +CVE-2024-34637,0,1,615026123a58e066501cdea7009c58e74240a80e765f3bbe0d7338d900fc0cf1,2024-09-05T18:05:27.753000 +CVE-2024-34638,0,1,91fe3b834e3462c15fbf154ef3d7ab38d545a9a64e15797ac8088d6d5c627d2d,2024-09-05T18:05:03.397000 +CVE-2024-34639,0,1,5126f9cb6c976682c17d65ace1405f88764b328ae3db088d28e0b57940c92216,2024-09-05T18:04:37.677000 CVE-2024-3464,0,0,9e608448fda895152ed315d883c9d4488539c5d01a2437614b47cfb67b0a4466,2024-05-17T02:39:57.540000 -CVE-2024-34640,0,0,c64ad878a91921d11fdfda70cc73e24a8ab919d0be10907b6201fad83cf318f2,2024-09-04T13:05:36.067000 +CVE-2024-34640,0,1,4c7fde7ff03197842352a86e70dbc537d9f440fdf4872caf494fd8acfe50d0ca,2024-09-05T18:04:28.607000 CVE-2024-34641,0,0,2b30fd1a9f5ae753629925215ca156579576fd060a975f5387ccb7d58dd694d8,2024-09-04T13:05:36.067000 -CVE-2024-34642,0,0,e24e4fd425c8a82dbb8a14c2c33de8425f99b99315590c30438359d97d744a2b,2024-09-04T13:05:36.067000 -CVE-2024-34643,0,0,9e9b311c0ce1e5994d97a341e46bd6d5397f2c637909e0411625853a41751d2e,2024-09-04T13:05:36.067000 -CVE-2024-34644,0,0,c841c0880f2a0920930777aa376cbe647a2935362e16d6281569741fb5eaff83,2024-09-04T13:05:36.067000 -CVE-2024-34645,0,0,2f99c158186706dbada71c0dac78c09379d069bd2cb9a84d4728594f76df8efa,2024-09-04T13:05:36.067000 -CVE-2024-34646,0,0,82e7c60c64a3d6d703a9c5022f2ae80fb7cf092d075fe3b961a4a2a453e8a1ea,2024-09-04T13:05:36.067000 -CVE-2024-34647,0,0,e317ed6496e4aa586bd11047d35b17feef7523f86ecd05c9da2f725afcae78f3,2024-09-04T13:05:36.067000 -CVE-2024-34648,0,0,1e6dbbe77ed97622b756d3057162d26db67ca4ea112b590ffb36caf47d43295f,2024-09-04T13:05:36.067000 -CVE-2024-34649,0,0,cb8c945b910593bb4442f9829c0aeb4b899de2f73eda03e4758d8aecda2a79cd,2024-09-04T13:05:36.067000 +CVE-2024-34642,0,1,54c219cd85c017e71c929c36652a56a6824f245d2f9be41abdf874c9b8dc39de,2024-09-05T18:03:57.407000 +CVE-2024-34643,0,1,fbb923e6665e4b9fcb93b30b65b07d4c83673c639c27d25afd12c5e752b948df,2024-09-05T18:03:12.323000 +CVE-2024-34644,0,1,3e53979f9850d51f064780cf789bbea28badd5caf32db28756d92b8a7c8bcf96,2024-09-05T18:03:00.687000 +CVE-2024-34645,0,1,8f19f9fc3883fba44872c78c61919a60977abb118105402af801e473996d3e3a,2024-09-05T18:02:05.363000 +CVE-2024-34646,0,1,edeba9381ffe1e265300acb78add2f9a670445e0c98737d267971e4c83c7231e,2024-09-05T18:01:31.600000 +CVE-2024-34647,0,1,6d2038b2c7cea5e7792676f55c6a98de9e775faaf645ae1fdfd642ee09016227,2024-09-05T18:00:35.493000 +CVE-2024-34648,0,1,b45f9142c06f0180ebfd48fce77cf7dcae627a0c91bcc8718675f5a63a6db84a,2024-09-05T18:04:43.700000 +CVE-2024-34649,0,1,090d55600f9305f3de93acd60274391fac0d3df413c041417bc6f7639178cd52,2024-09-05T17:59:55.210000 CVE-2024-3465,0,0,6e61814cfea547ec37c26ad0e88e359beda44dc20babd4ed16862aa3d501f9c6,2024-05-17T02:39:57.623000 -CVE-2024-34650,0,1,8797381424653e69272b40924388c1155306dbb9ee2a15fbf1039c6208c5975a,2024-09-05T17:59:36.770000 -CVE-2024-34651,0,1,3a20d3629137de84b12f6ced22ad825416197d4c55039595219fc5b45329b2cf,2024-09-05T17:59:25.727000 -CVE-2024-34652,0,1,5fcd4fa460cbaeec0f8df845e452b826bda7eb569c47b7926c3e1d9633ab54dd,2024-09-05T17:59:08.393000 -CVE-2024-34653,0,0,c3a7e954eae03c5034f7310465d52a6d651a7628b08f94570c9641d6a004f62f,2024-09-04T13:05:36.067000 -CVE-2024-34654,0,0,1d61292010af329608ba714089b18097d9f4fab29ea3188e580a21180dff7fc9,2024-09-04T13:05:36.067000 -CVE-2024-34655,0,0,2b9a720979634d406c7a6ab85768813b9644c17199100988da7cc12ecbddf162,2024-09-04T13:05:36.067000 +CVE-2024-34650,0,0,8797381424653e69272b40924388c1155306dbb9ee2a15fbf1039c6208c5975a,2024-09-05T17:59:36.770000 +CVE-2024-34651,0,0,3a20d3629137de84b12f6ced22ad825416197d4c55039595219fc5b45329b2cf,2024-09-05T17:59:25.727000 +CVE-2024-34652,0,0,5fcd4fa460cbaeec0f8df845e452b826bda7eb569c47b7926c3e1d9633ab54dd,2024-09-05T17:59:08.393000 +CVE-2024-34653,0,1,677330c93a4b4f53244647b85632be75f577b8d63e27df66036ceaf9279b43ee,2024-09-05T18:04:40.810000 +CVE-2024-34654,0,1,6f465f944e3d70bce6526d6d1148c1e634bb7c08992888ceb1abb536af6c667d,2024-09-05T18:00:07.057000 +CVE-2024-34655,0,1,dfac8eb7e02ea4fde394dff14f36d75c33b2306795d4e4e527cae6398c8df500,2024-09-05T18:00:39.270000 CVE-2024-34656,0,0,4b5097936519572ad489ac32cb14e42c878e2a5293e1ee1278fd186194deceef,2024-09-04T13:05:36.067000 CVE-2024-34657,0,0,e76dd3b191c96b6eebc5e6b8603c75eeff96d8eae90f914ab3a15f3eb419d2ec,2024-09-05T13:48:54.077000 CVE-2024-34658,0,0,0bdbae0b2b42061a8353c4769a7cf5c4aeee0cbc7bbbfd2a997adcca4577f91e,2024-09-05T13:48:52.273000 CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24946,2024-09-05T13:48:55.767000 CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000 CVE-2024-34660,0,0,0b2d2bea24d7fa6e914da9f7286c2cb2a544faaaec97dda10fa17e8966604e75,2024-09-05T13:30:28.343000 -CVE-2024-34661,0,1,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405dbbce,2024-09-05T17:57:44.563000 +CVE-2024-34661,0,0,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405dbbce,2024-09-05T17:57:44.563000 CVE-2024-3467,0,0,f97f520f5797999559b92a7c0577ac536f47706a8739d6dd391d5611a09166cd,2024-06-13T18:36:09.010000 CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 @@ -254731,7 +254731,7 @@ CVE-2024-36969,0,0,e622ab8131a3dbc40ec2fb2b416de8073d7058b237c224b8ddf44dea78c18 CVE-2024-3697,0,0,6e56c636d90d09536d9c0a6418223e2755a5c4ad9d107f96b9c5e19a7cee17c5,2024-06-04T19:20:23.323000 CVE-2024-36970,0,0,71019bd2eae5fd365be1f562acf6569962a155e7ea79c468fc47a7884a32f8dd,2024-06-10T02:52:08.267000 CVE-2024-36971,0,0,19a783e743bca7b704f26b9e2c301763abbc69d1adcc4e7bcc3cfec2328bc2ff,2024-08-08T14:49:52.603000 -CVE-2024-36972,0,1,7bbba9a70bef2603cbb612a3ea6c357acf950e5c749701ab5770f0ee97a6dac2,2024-09-05T16:35:20.120000 +CVE-2024-36972,0,0,7bbba9a70bef2603cbb612a3ea6c357acf950e5c749701ab5770f0ee97a6dac2,2024-09-05T16:35:20.120000 CVE-2024-36973,0,0,ad2c4092d909690c4766323dda96dac09439cf4ae37914f4902c28191444a81a,2024-06-21T14:15:12.250000 CVE-2024-36974,0,0,aa342464f56df4c331d398bcc0f3e68d9c36f35501b54bcc80e29a36fedbdd6a,2024-07-05T08:15:02.943000 CVE-2024-36975,0,0,5fee8a8667371d6492e42fc16656270b45581df0fcea64415a84141dc6966f70,2024-06-20T12:44:01.637000 @@ -254856,7 +254856,7 @@ CVE-2024-37132,0,0,32a23a7a93e12576e3cef44acbc1e26d96ab3673ab3a48bd46dd4729adbac CVE-2024-37133,0,0,00b1139f9174975ec5c3de34a64ed678ba7d69bbdd2f853dfe982f25e03c56e7,2024-07-03T18:01:19.487000 CVE-2024-37134,0,0,8ed9324b0e419d00f56c9177e18aa3c394712dc2a31ec456c168c8f73d2e83d7,2024-07-03T18:01:30.463000 CVE-2024-37135,0,0,1825f0bbd6a3644a5defcb06610c875a4d62a2c01b0edfc19cfb2bb9d9e24173,2024-08-01T12:42:36.933000 -CVE-2024-37136,0,0,6830bce2f72d2daf2ecb46a699466f4d0c58dc1c8dfcfb769d983f90ee324f83,2024-09-04T14:59:32.320000 +CVE-2024-37136,0,1,9c611050d67ee5f97dba12c407701fa5992aca1746329b7956fb99514cec73a4,2024-09-05T19:01:28.123000 CVE-2024-37137,0,0,015bdbe57b75c18c5c9568a3702d89c1497d9ae0c088b4ae375896212249bae1,2024-06-28T10:27:00.920000 CVE-2024-37138,0,0,0a1a2faf5915443beb4b9b146b70944e6a09572b5304f90b5e8531aa017e41a8,2024-06-26T12:44:29.693000 CVE-2024-37139,0,0,8bcc51f0578107c550f57eda3e8f8169088ed87cca1e5fda916b143e22a12acf,2024-06-26T12:44:29.693000 @@ -255159,17 +255159,17 @@ CVE-2024-37545,0,0,cc36312e33c5d9198888c13f423056b47603977e3d4e35cd4aaf41d9955c2 CVE-2024-37546,0,0,15d2f69b9e243872883271a263f0f98a7cadf2d2b6330d1b0039775f8b820e1f,2024-07-16T15:15:53.790000 CVE-2024-37547,0,0,596f05c244456fc1293d31288161c329ef0ad9c73f115fe7a6fb9d176c56d0bc,2024-07-19T11:15:02.250000 CVE-2024-37548,0,0,ca9df3e56c40705127835e3f8dd2df1f50dfece21c5b19f10bf1ff2831b4a0ba,2024-08-30T20:47:13.600000 -CVE-2024-37549,0,0,988c26d872242eb88c0304bbf96165636c968c1b7fc6562538f12e1fa244c371,2024-07-22T13:00:31.330000 +CVE-2024-37549,0,1,21f3bf8023ef6ee94b53c0e93c4a47d2e5de951bcb545fdc68cce8fec6d5a6ec,2024-09-05T18:56:30.617000 CVE-2024-3755,0,0,8cafc79eaf2c3910650f08b14194d69f8220c0f69642a219963ba78d46519ab2,2024-05-06T12:44:56.377000 CVE-2024-37550,0,0,839fb6e2b44f79343f95b67e176198e41135987b08b8d616f52f8fc24cfcd8ca,2024-09-03T21:21:01.540000 -CVE-2024-37551,0,0,2bd80e2bbd4722bd06821b62cb67818a19461713e2015f051c1c062028863236,2024-07-22T13:00:31.330000 -CVE-2024-37552,0,0,9801b1ca1214e6257e83312b5525902b2c9ae5f172592c47825afa1b52c88cfc,2024-07-22T13:00:31.330000 +CVE-2024-37551,0,1,2fb108fddf94356e7762d23d0e79238145571cc531a36b504c711b38071a48bc,2024-09-05T18:57:45.293000 +CVE-2024-37552,0,1,8c286748715cc0ef893b84fe900ad1c599d5873e7bfd806302e09287a6e859e5,2024-09-05T19:02:08.367000 CVE-2024-37553,0,0,5fb366736775031e7f51d377e259cd5fd849d825ec5c66cfcefe7a5c9ef4717b,2024-07-12T15:24:47.953000 CVE-2024-37554,0,0,f21873c8cc723d73a5be37e43f70a0cc0c9c1c460efddd02b4e8ae7999da0e5e,2024-07-12T15:34:57.437000 CVE-2024-37555,0,0,1644327e39d431b11dca9e571309a66e1f1bfd16300400fc24b3c08e5496ae7a,2024-07-17T18:11:44.260000 -CVE-2024-37556,0,0,78161c558137287d669c7ffb38efbb574c31b393a01155d114ce06462f43641d,2024-07-22T13:00:31.330000 -CVE-2024-37557,0,0,6ca53611c1052370799044fdba5d61adad1f0419b10ef5f0c7849cece064eace,2024-07-22T13:00:31.330000 -CVE-2024-37558,0,0,2b6c4584f323bb7a1ddc54229bfb0e08e0d9a205f20b43ba0e74fbe5b27c967f,2024-07-22T13:00:31.330000 +CVE-2024-37556,0,1,4779d917d7029a8818826a69201fcf2d535218623286eb5c7c782198152108f3,2024-09-05T19:40:19.833000 +CVE-2024-37557,0,1,cb498d6a6ab18b12a8c20edf572d8321b44f0e86b66882338ca320d18e11bac2,2024-09-05T19:41:26.830000 +CVE-2024-37558,0,1,b97bcd0aae3bdff8e417d2db7221697f8ed63cc1e0f9d6ec74987ebb0521eb05,2024-09-05T19:47:47.523000 CVE-2024-37559,0,0,e91ba5642c8588904d27a7b3d58b802cbc95629a385da38953be8c468dfa5411,2024-09-03T21:27:06.423000 CVE-2024-3756,0,0,9f6325e6bf8bb208b4e2ee6674c7d5cde657d33007cb72c8f23cf7232b49431b,2024-07-03T02:06:32.530000 CVE-2024-37560,0,0,02df965b0c547c5d65bc5d2f53e9aa68413adaa23aed22cbc4e8c5dba3c3ed86,2024-07-12T16:34:58.687000 @@ -255729,7 +255729,7 @@ CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 -CVE-2024-38482,0,1,9abc0a21b4d338765e493606e519fec01088c089d21089e2acce085b7e1d0261,2024-09-05T16:04:53.577000 +CVE-2024-38482,0,0,9abc0a21b4d338765e493606e519fec01088c089d21089e2acce085b7e1d0261,2024-09-05T16:04:53.577000 CVE-2024-38483,0,0,d89f0c1af2745eaf3307200f5493e8a825a53b577d01487f0db0b0e51a7359ef,2024-08-14T13:00:37.107000 CVE-2024-38489,0,0,93d5075288eb71dc5e05de45f3028a8abf40e549af9e7f74c8d90c91ab2994de,2024-08-02T13:54:55.697000 CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000 @@ -256876,7 +256876,7 @@ CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6 CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000 CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 -CVE-2024-40645,0,1,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000 +CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 @@ -256943,14 +256943,14 @@ CVE-2024-40786,0,0,1d5a22dc485257f61ad56f387446230ed28d8c6d76c2d4bb7e66185337af2 CVE-2024-40787,0,0,e7872c59114f8bc6e1d61059bacac8cf94d2c897fdc9c325ee9cdaea3ebeeed2,2024-08-26T17:47:24.847000 CVE-2024-40788,0,0,51328768774901f71a8cfa9e0731eec2a8688c92707f2ca0771dadf5f755cde3,2024-08-26T17:49:39.517000 CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9acdf,2024-08-23T15:38:01.380000 -CVE-2024-4079,0,1,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 +CVE-2024-4079,0,0,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 CVE-2024-40796,0,0,167dda6d5b53df5808d22d86ff64345a4ddef11147328dbbb9b5e6428b829c22,2024-08-23T15:11:50.193000 CVE-2024-40798,0,0,6d1152787dcea537c7e301ba90812de2a5fee24ebce973ba886712a223c78f27,2024-08-23T15:10:16.290000 CVE-2024-40799,0,0,30d98ec87bf2d9634952ceda39a0df401d585b86f88feda233e1fd632794577c,2024-08-23T15:08:08.647000 -CVE-2024-4080,0,1,3208a4e2c1701a8955389b97eb99ba9a08ddab88da9fab5dc755bfee24643da9,2024-09-05T17:16:23.233000 +CVE-2024-4080,0,0,3208a4e2c1701a8955389b97eb99ba9a08ddab88da9fab5dc755bfee24643da9,2024-09-05T17:16:23.233000 CVE-2024-40800,0,0,8982c6397894b1dc7853d99d7f7ed84917fd2baa65d0f955e452134c8e783d29,2024-08-01T13:58:06.780000 CVE-2024-40802,0,0,2f077053b399c3f7f7833d620863c41648e3e5560dfd43fbc619d567c4540b58,2024-08-01T13:58:07.597000 CVE-2024-40803,0,0,250e23643ab70825c88d787d0aaf9fc9eb4a1612199960dbb1b65e0a8601ad01,2024-08-23T15:04:55.627000 @@ -257213,7 +257213,7 @@ CVE-2024-41096,0,0,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0 CVE-2024-41097,0,0,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000 CVE-2024-41098,0,0,237dbea03703cdca512eadfee5b46e503b7d4deeacfff8f1388ee9743f950b5e,2024-09-04T12:15:04.447000 CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000 -CVE-2024-41108,0,1,a789f7b30bfa16589037e73208bf53d149517f9d21b7a48a75aded9d6e98d22f,2024-09-05T16:27:50.103000 +CVE-2024-41108,0,0,a789f7b30bfa16589037e73208bf53d149517f9d21b7a48a75aded9d6e98d22f,2024-09-05T16:27:50.103000 CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 CVE-2024-41110,0,0,73fe8c24dc51cc9ae0d0f228bfd2d081609568fbc3ab82eb1b26156020a860c9,2024-07-30T20:15:04.567000 @@ -257230,7 +257230,7 @@ CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6c CVE-2024-41120,0,0,a70d4faa55c7ddaaf93976569e1c96bdce498cb1f9f22f75468c1ec57f8b4cef,2024-08-26T17:33:33.787000 CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000 CVE-2024-41122,0,0,a6a8383a81cf09c9b153a0323d2516ac8ce416bc61d76a25c8333778bb40d081,2024-07-22T13:00:53.287000 -CVE-2024-41123,0,1,f4b244c723cc06d0f1b3d984c60a3f38c5bb280615f1544b263a60aa7e5203a1,2024-09-05T16:12:21.557000 +CVE-2024-41123,0,0,f4b244c723cc06d0f1b3d984c60a3f38c5bb280615f1544b263a60aa7e5203a1,2024-09-05T16:12:21.557000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 CVE-2024-41127,0,0,2519293e8a68005ce52133a682e98e20cf58a0421db4f824efb1564386790de3,2024-08-05T12:41:45.957000 CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 @@ -257368,7 +257368,7 @@ CVE-2024-41439,0,0,7b3c1664f9930e6509340f8cc42233a6bb9a46e8c57c131a2fcdb17cb5a1f CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000 CVE-2024-41440,0,0,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000 CVE-2024-41443,0,0,1be6f511e21ef9a107685136f15f3c2750b611a333337ffc199f4824cee060ab,2024-07-31T12:57:02.300000 -CVE-2024-41444,0,0,abf00e890aab3eab79de5f49a6550430273c34dfb216bb88f1c4a5e644eb4c70,2024-08-26T19:10:09.607000 +CVE-2024-41444,0,1,5ea59719718418adee108f9ce5540b96facb8a58caf3370b9e6aa1a42ff02782,2024-09-05T18:36:39.773000 CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000 CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000 CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000 @@ -257584,7 +257584,7 @@ CVE-2024-41875,0,0,57025102705afb3f64ed9ca037e457d95a3751eb418da98d63205817feaa1 CVE-2024-41876,0,0,2e90360efc316da37d37f6761f555864c070f8e4b10b19f1a9af1a905273c5a3,2024-08-27T14:45:40.377000 CVE-2024-41877,0,0,6103adaf29f838766c82e017d2b75c7c95c893efc9460aaf0a14a2c0a2483c27,2024-08-27T14:46:02.147000 CVE-2024-41878,0,0,9300134362b823bfd7137dfe44145c2c81ccf4703cce3a1d8aabe5d5b2714035,2024-08-27T14:46:24.667000 -CVE-2024-41879,0,0,776d1d630925a5effc005e3c54df4f1e81379153a0d899b1b1392cbd63b7b386,2024-08-26T12:47:20.187000 +CVE-2024-41879,0,1,1e60878859eb5b5dc78f4bbc319f1634c8092e67978f8911975094d9a8a19449,2024-09-05T19:58:35.130000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 @@ -257624,7 +257624,7 @@ CVE-2024-41942,0,0,7923ac40921d31d0296434cafefbd05115f6a6de46c0d45a5dcdea9f8a327 CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000 CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000 CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000 -CVE-2024-41946,0,1,0c8984641c723ad5c183e5dd0f3ccca9c504d7530b3c6a092508aec5b06adaf1,2024-09-05T16:09:45.503000 +CVE-2024-41946,0,0,0c8984641c723ad5c183e5dd0f3ccca9c504d7530b3c6a092508aec5b06adaf1,2024-09-05T16:09:45.503000 CVE-2024-41947,0,0,489889ea045ed7e83ddaa8e74cc5bef9c95d6933aa19a93d66e14365f9a47770,2024-08-01T12:42:36.933000 CVE-2024-41948,0,0,95b8e7bd495b369e148a4aee32aaebfe7255dd0e1bf38771c2e96e2af8f6ed4e,2024-08-09T18:38:47.533000 CVE-2024-41949,0,0,ca775db8fe7ff2b3f65a9b7415410183458d660652f7e7a24514bfd892cb0821,2024-08-09T18:32:53.153000 @@ -257633,7 +257633,7 @@ CVE-2024-41950,0,0,cb384ef22df022e960189f7f7e44ba5570748379fe4c550a69c77cdcfc6ae CVE-2024-41951,0,0,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1a8e,2024-08-01T12:42:36.933000 CVE-2024-41952,0,0,a2a2d5c0bd3ad0150caa88e61ff72fdc96306c7692a8efbe895ab20341c07bae,2024-08-01T12:42:36.933000 CVE-2024-41953,0,0,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8fe6,2024-08-01T12:42:36.933000 -CVE-2024-41954,0,1,12ebe240a4a0966847a3fede7a35454b626561fae59f5ff3a5c94f1913b7c9e6,2024-09-05T16:18:09.940000 +CVE-2024-41954,0,0,12ebe240a4a0966847a3fede7a35454b626561fae59f5ff3a5c94f1913b7c9e6,2024-09-05T16:18:09.940000 CVE-2024-41955,0,0,5ad0263667cf66f8813b7d99a3968b8a2424832b6c51b00aba139fada06ab3c1,2024-08-15T14:10:40.157000 CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000 CVE-2024-41957,0,0,f207a653c0f0f9d782c3e5585f7eb5df8054bd1cd710ccb1397440f0e840612a,2024-08-09T14:14:01.190000 @@ -257696,7 +257696,7 @@ CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa CVE-2024-42060,0,0,ff15c22376c8dde36cedf61eeb3084b3bf28f3c70c1acd3697d4c1f3846960a2,2024-09-05T14:37:03.387000 CVE-2024-42061,0,0,ac3d3c8fb09e0caaee82bc4a33d8dd91e2bd7a37069679b697256fa9ff42392a,2024-09-05T14:32:24.620000 CVE-2024-42062,0,0,3922ac166d4741c0e9e1f40d2e41e54b1ba7c14a58359ae6075c326b0cd4fd8b,2024-09-03T20:35:17.017000 -CVE-2024-42063,0,1,fb176955212cbbe386510b916a6cf2daadc2bf4a1d6f4bce61554db1fd1f0fc1,2024-09-05T17:42:12.670000 +CVE-2024-42063,0,0,fb176955212cbbe386510b916a6cf2daadc2bf4a1d6f4bce61554db1fd1f0fc1,2024-09-05T17:42:12.670000 CVE-2024-42064,0,0,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000 CVE-2024-42065,0,0,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000 CVE-2024-42066,0,0,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f9751ee,2024-07-30T19:02:32.857000 @@ -257788,7 +257788,7 @@ CVE-2024-42144,0,0,e5c21b4c9eddff64d5a0d83eb17a4af393a8e8cc5218a1d4bd948e45a6afb CVE-2024-42145,0,0,a448e3c1383099fefdc00f942a6c3fb1a7a8eacac6267abd9d8600f8c195e000,2024-07-30T13:32:45.943000 CVE-2024-42146,0,0,5965ab1472d6386a707c678e04edf7b1fc9b55dd002222344e4b70614b23a1bb,2024-07-30T13:32:45.943000 CVE-2024-42147,0,0,e2fd4695f400d20f040989dbb1fd9b7b08c61afb65d2c6bfd95fc31d8cbb9fd3,2024-07-30T13:32:45.943000 -CVE-2024-42148,0,1,aa7a751d2d2744139ce0c7fafc16a784272427e696dbcdb6ab1cc36c4bae1c23,2024-09-05T17:46:27.683000 +CVE-2024-42148,0,0,aa7a751d2d2744139ce0c7fafc16a784272427e696dbcdb6ab1cc36c4bae1c23,2024-09-05T17:46:27.683000 CVE-2024-42149,0,0,649ede760b2b7270506bd2e8f6e94a8f5d04fb5a4016b73e8b26514807ad0c08,2024-07-30T13:32:45.943000 CVE-2024-4215,0,0,9e7e3a04514a4f3c8325efbee683d76ee50f1989bb723741735a5cc60f766fa9,2024-08-01T13:59:27.703000 CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad32d,2024-07-30T13:32:45.943000 @@ -257888,8 +257888,8 @@ CVE-2024-42284,0,0,3de089e862fb9363cf440d4ddcd6c7f62488df29d936c169ac7a6ab7bc964 CVE-2024-42285,0,0,4ec0160442d1538b95cde72767ac70bc274486d2ce7c96c2406c062e83be4de0,2024-08-19T19:45:41.590000 CVE-2024-42286,0,0,24061156d805ced1339b1724f8564154074076c09f5e325f327fdc585683f93a,2024-08-19T12:59:59.177000 CVE-2024-42287,0,0,ab99cb2182c9d6159d40449c7d07218d1774759ae812acadb1ae409447b25c10,2024-08-19T12:59:59.177000 -CVE-2024-42288,0,1,3bca3bb153b051d1e9a150826b5840d5f5c16eca31e67293c4ec7eba9cd334b4,2024-09-05T17:38:38.383000 -CVE-2024-42289,0,1,04c815d082050729894440e6e2a5f87ed59b488996e57849be0708360c5605bb,2024-09-05T17:37:49.057000 +CVE-2024-42288,0,0,3bca3bb153b051d1e9a150826b5840d5f5c16eca31e67293c4ec7eba9cd334b4,2024-09-05T17:38:38.383000 +CVE-2024-42289,0,0,04c815d082050729894440e6e2a5f87ed59b488996e57849be0708360c5605bb,2024-09-05T17:37:49.057000 CVE-2024-42290,0,0,d27aca27562195d04490643fa18705d7b7ed22675306a86b123d07597c93e3ce,2024-08-19T12:59:59.177000 CVE-2024-42291,0,0,72aa73e566f0b3c5cb157f1659781e489a73109e53174d8bea3ddc4964e85fe8,2024-08-19T12:59:59.177000 CVE-2024-42292,0,0,8310aa9a5630623a5a144ae735b237b95b640aed6f25022423101f353e6f84b0,2024-08-19T12:59:59.177000 @@ -257907,7 +257907,7 @@ CVE-2024-42303,0,0,dcf78b75f0f625f0e1e5df3b0bc433e9d8484bdabfad7ed343c7012b7aaaf CVE-2024-42304,0,0,d173e622eb62d973d07785876ea39085958d8e911790210e06238340260b1d9a,2024-08-19T12:59:59.177000 CVE-2024-42305,0,0,2a0027efaf18337e14a39532daab3b0d02ba1e240704105fd7925f4d1b755c9a,2024-08-19T12:59:59.177000 CVE-2024-42306,0,0,ecd4db3e8cdd17b10ea08b2eca0729317a2688c0bef58523ae201bb7d84633e3,2024-08-19T12:59:59.177000 -CVE-2024-42307,0,1,979ad70f7e00ffa1bd38ea1452c16c437681ce079eb10d014525c56c5760da58,2024-09-05T17:49:58.257000 +CVE-2024-42307,0,0,979ad70f7e00ffa1bd38ea1452c16c437681ce079eb10d014525c56c5760da58,2024-09-05T17:49:58.257000 CVE-2024-42308,0,0,6d17eb1d30ed4c277ed040e1cbcd780b2faf7a8a39bdbdb95054b558731ed40e,2024-09-03T13:56:44.633000 CVE-2024-42309,0,0,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000 CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000 @@ -258031,6 +258031,7 @@ CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca76 CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000 +CVE-2024-42491,1,1,976187c9696aded6c4c3aa4635fbfd03a0a85610ed703644756e79b8df03558f,2024-09-05T18:15:05.707000 CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000 CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 @@ -258194,9 +258195,9 @@ CVE-2024-42787,0,0,88d5b9fb8d148270d8805b4da2d63d994d92e9c93bf6bfa364fcfc0bc1637 CVE-2024-42788,0,0,a944343d984183d9671961186501cfd758ccb98c0318801f8b80c875f7b8eb97,2024-08-26T19:35:29.970000 CVE-2024-42789,0,0,ef16d9e3057430609782f812ca6eaebee9c0fab467795e1c42a75384a8ce22ea,2024-08-27T20:35:34.673000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 -CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000 +CVE-2024-42790,0,1,62118f0a801ee0dae7272364dcdda1568011ac510014c09979b48bfde8c76258,2024-09-05T18:36:04.237000 CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000 -CVE-2024-42792,0,0,4eaaa19a355275b40166aa1a2acd468fef8bb5420612bb7385f6e2e1abaacd08,2024-08-26T19:10:09.607000 +CVE-2024-42792,0,1,3d5171455e36c62db86c3f1d03eab38bfdac82c0ed4f595e590432a1180621b9,2024-09-05T18:35:24.220000 CVE-2024-42793,0,0,c34b0c01a33da3f3b96951729540996987faac6763a3b4211067000d740419d1,2024-08-30T15:56:51.510000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 @@ -258215,7 +258216,7 @@ CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 -CVE-2024-42885,1,1,bf3cbbf400e6178fb46075999d38c431cfe8361deab39495b00740e627ca8d78,2024-09-05T17:44:56.007000 +CVE-2024-42885,0,1,533f4dbf06b433562738b41b5ea3f2548e262c0dccd559f0740e9855280df801,2024-09-05T18:35:07.060000 CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 CVE-2024-42900,0,0,a581afacf971ea3c7e1f415a11d8d3e50a8cfeb83f82ad9071f65c9958d77bb9,2024-08-29T13:25:27.537000 @@ -258224,9 +258225,9 @@ CVE-2024-42902,0,0,9ec33f56abfe4faabb7d9151ffea5254b69b33ec55994f59970b2e00b31fd CVE-2024-42903,0,0,f8ec8d0a5ac73bcf3e6980f24f76b67bb3854cedda63f18407522c17dba84153,2024-09-03T19:40:46.783000 CVE-2024-42904,0,0,53fb99804779cbe86bb4482b4fae924f3c061640de033d1aa2634bf0cf1cab4d,2024-09-03T19:40:46.783000 CVE-2024-42905,0,0,ddc067821c332a4c26091e24326b09fd2b356b1e4a19dc86f0c28846472da9f5,2024-08-29T13:25:27.537000 -CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000 +CVE-2024-42906,0,1,cc2cfd302f98bc8abbaa33d518c8db7a07c20a38c02bbc55140f1fc78b4b03df,2024-09-05T18:29:02.627000 CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000 -CVE-2024-42913,0,0,4ee002af12bf9d3762c244fec3fad984905617a81f77c95a7eb3d308c6c9d288,2024-08-28T20:15:07.880000 +CVE-2024-42913,0,1,2ff9c56d853649a800b84b6cb1da831a3ed40465a00c98ace5410f80abf8e1bc,2024-09-05T18:31:19.263000 CVE-2024-42914,0,0,3f5ac8ab7960d4d4afba31e3c38cdf6845691feab9592a20b6c730d697770531,2024-08-26T17:35:10.510000 CVE-2024-42915,0,0,f864c31afbca80b902e69688b4024ae2389f775878951406a546e92d288d6fa4,2024-08-23T18:35:05.490000 CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4e17,2024-08-27T14:47:12.097000 @@ -258677,19 +258678,19 @@ CVE-2024-43883,0,0,91d9dc24243e1eb7439b854fe03a12be52a8a2651dc7ad627233ff467dcca CVE-2024-43884,0,0,8855d9ae2c31e31bcdb4b964e2ea59c1af3388d7a4ae33aa27b44c6e1351565b,2024-09-04T12:15:04.927000 CVE-2024-43885,0,0,11114407819a3f9e00d8d9cb1392c069e87eaa286d3f0b384cc6ce2d553b62cd,2024-08-27T14:37:37.887000 CVE-2024-43886,0,0,e1250be1137132d32f51f141081958e76d96de370d77286a8411bf00a519b833,2024-08-27T14:37:45.377000 -CVE-2024-43887,0,0,376d550e40434349f0ec085b772876fe107bf2fe9c2438232db402487dd1f398,2024-08-26T12:47:20.187000 +CVE-2024-43887,0,1,0808796db9a8a8184ad3e8b5890f2f1f129a2436209f8edffa26c5d8252a78fd,2024-09-05T19:43:44.197000 CVE-2024-43888,0,0,e54f63212ceaa42960fe94aef21d508a624b7b901f30a84146e78625f3a09e87,2024-08-27T14:37:52.610000 CVE-2024-43889,0,0,5465d7ffa5fc173afac72302c5033ac280f7187ac42839effc5a469d05fb8493,2024-08-27T14:38:09.340000 CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000 -CVE-2024-43890,0,0,4f712d05ce91a4751f64280bf4157d384fca158e731343a0c38233f08c451c0c,2024-08-26T12:47:20.187000 -CVE-2024-43891,0,0,4ef44ee5af8e139ccdf34375791750ab6c7298629aa1445de91887e9d89cc011,2024-09-04T12:15:05.050000 -CVE-2024-43892,0,0,deb8528aa31e26463fac79d269b1f10d2a832a9d2bc865cbcc002e5906dfe3d4,2024-08-26T12:47:20.187000 +CVE-2024-43890,0,1,822d0066e26c4794d884984a8e03a3a06f467a55da908fa8402229c4f6b6fd95,2024-09-05T18:48:30.320000 +CVE-2024-43891,0,1,1c23f1bf42b54dadc6cc9129673e1e978162326fb473b5b49bcbd4f88fba9477,2024-09-05T18:46:18.440000 +CVE-2024-43892,0,1,86ff0a9f1a6222f84cf421b01facfc2f5b5a62d0de62a7fbabb393baebbfccda,2024-09-05T18:41:38.723000 CVE-2024-43893,0,0,43d0e9d62118f7a5f6c9bfc09f584d8b53fd652e6e40996287fc9d1d1f10383c,2024-08-26T12:47:20.187000 CVE-2024-43894,0,0,7a0da327bf71c13dadb4c3586216ee65cc1ccf79c9e17e8e4e11aa7af72ebd02,2024-08-26T12:47:20.187000 CVE-2024-43895,0,0,f4f0faf6f450c11bcd9bbffc3bfe9363bfd6c37323777a86f991b1d25c456a35,2024-08-26T12:47:20.187000 -CVE-2024-43896,0,0,02f54c59717b3feef195015864900404f36f00fe9986d4059d517c9dd0f9a5bb,2024-08-26T12:47:20.187000 -CVE-2024-43897,0,0,f0f19d4c6371825704d376e54489917481cd4d9ad4f907a2d95f0a5bdf06c617,2024-08-29T17:15:08.533000 -CVE-2024-43898,0,0,b20ddc83f3dcf4bc1ad714089af29bfc939502c108354aa514b44633c401dbf4,2024-08-26T12:47:20.187000 +CVE-2024-43896,0,1,9e528459b2e50d1f7ce6be809e552e51735f0b29caed43fdd44f11c615a94e16,2024-09-05T18:37:16.483000 +CVE-2024-43897,0,1,2b25f81c1149d4543feb64d1945cd77374bca366086287d738b75eb1fb250919,2024-09-05T18:36:30.347000 +CVE-2024-43898,0,1,eb2d891f368dd7e7d45b6a01504ae83a8bea36fb4cfa324da794af8eae8103b0,2024-09-05T18:31:14.293000 CVE-2024-43899,0,0,1953a8ac8e9197ec884f1f7ed08130ca2ce11e7bc600d6d066b299186890c781,2024-08-27T14:38:19.740000 CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000 CVE-2024-43900,0,0,4d8a1c377893c2bcc68b32981f4665a8b2876e47e79e3a70bf603165a8c8d4be,2024-08-27T14:38:32.967000 @@ -258703,11 +258704,11 @@ CVE-2024-43907,0,0,73e780d9fe01ae8cc5a4e065d7a6d0780649fed471971eb378d0bc9554d2f CVE-2024-43908,0,0,37f71e1240c38f7f5d5430994391502a308fcc5874d7b6b8d1d03bb0a35a093a,2024-08-27T13:41:55.260000 CVE-2024-43909,0,0,cf942173e7a980038b2545ed960379cf4d09253a719e1fb264ba55492ee93b8f,2024-08-27T13:41:48.467000 CVE-2024-4391,0,0,3c50ad807a6efe83c676c20cbd033bdfc9a5c436710b6a08536dff480db62e6d,2024-05-16T13:03:05.353000 -CVE-2024-43910,0,0,c87011ab8f713b3ebb471fd888664070478553118f1bf02ef6c18fc5aecc94c9,2024-08-26T12:47:20.187000 +CVE-2024-43910,0,1,773cf052d8e026a867a26a03cd95c549f97fd5113a4e21ef19a9dd2061184636,2024-09-05T18:30:23.437000 CVE-2024-43911,0,0,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c71fe,2024-08-27T16:08:52.493000 -CVE-2024-43912,0,0,9224434204b7590693cac3418bf42ebf514074b8e8db707b0e4b732c2fd9e6a1,2024-08-26T12:47:20.187000 -CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d316,2024-08-26T12:47:20.187000 -CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000 +CVE-2024-43912,0,1,1b5f8cbe48a45565b6e53eaf1fe9841ae7c6fee05a68cb38187e11b5ac523f51,2024-09-05T18:19:17.067000 +CVE-2024-43913,0,1,1c9fd1b4295df0d3d5ed94da6708f3aa88fdfeb6b586d9b4c06ecb1ea382472b,2024-09-05T18:12:55.680000 +CVE-2024-43914,0,1,cecc040296533d16ec68f112b8d7429d7c31abfac86050a6f05da890be7d265c,2024-09-05T18:03:49.997000 CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000 CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000 CVE-2024-43917,0,0,763320422d1f5f6b627e67997133b73d2d81c353f19b439bce5f72673e32a57d,2024-08-30T13:00:05.390000 @@ -258794,13 +258795,13 @@ CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da6 CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000 CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000 CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000 -CVE-2024-44383,0,1,61161f14ee9e1bbc10672e1fab2e09d74d9f284407ea43d9a42db04391985d02,2024-09-05T17:38:48.020000 +CVE-2024-44383,0,0,61161f14ee9e1bbc10672e1fab2e09d74d9f284407ea43d9a42db04391985d02,2024-09-05T17:38:48.020000 CVE-2024-44386,0,0,22e44353838544d5af3c6c1b599355e6c28d0abe3355a29bf08b92b0bac131e5,2024-08-23T19:35:18.987000 CVE-2024-44387,0,0,f40bbfc4dd5c4303dcc7ceb337218443a73c6de292a9dc96408915cc8c9cbcd7,2024-08-27T14:48:04.820000 CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef12,2024-07-03T02:07:34.593000 CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000 CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000 -CVE-2024-44400,0,1,0c3e5b1800b447d6bd6ab238fd2bacb82ed9f30c0c18da18f32396adadb223dc,2024-09-05T17:37:42.787000 +CVE-2024-44400,0,0,0c3e5b1800b447d6bd6ab238fd2bacb82ed9f30c0c18da18f32396adadb223dc,2024-09-05T17:37:42.787000 CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000 @@ -258829,7 +258830,7 @@ CVE-2024-4456,0,0,4944908816b0dabd168db28a33c87155bafc589f1ccdd7f87c25aad569cea4 CVE-2024-44563,0,0,6dbd76e0f089d60e056938eea08be0958b9b4b0e2739be9b2567dba585143e70,2024-08-27T13:43:26.300000 CVE-2024-44565,0,0,e25f465e010d5d48f951ee0faaea27800251f5ba71d3aee72b61ca7f81604b74,2024-08-27T13:43:46.897000 CVE-2024-4458,0,0,0a429f9bf96fae3ee6bbb1cf09933ff34e8fcd6340740204bd4095a557c4fb2e,2024-07-24T20:23:12.307000 -CVE-2024-44587,0,1,01244a38583c2f8e633cdff3a6f8ce1c3f4046ffa2bbe3e14639d70f292fabe5,2024-09-05T17:44:56.007000 +CVE-2024-44587,0,0,01244a38583c2f8e633cdff3a6f8ce1c3f4046ffa2bbe3e14639d70f292fabe5,2024-09-05T17:44:56.007000 CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000 CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000 CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000 @@ -258846,8 +258847,8 @@ CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037 CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000 CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000 CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000 -CVE-2024-44727,1,1,31d82a3ac296075a78d5be20f1665bbcab34b69a56ef7468a068c355340e3560,2024-09-05T17:44:56.007000 -CVE-2024-44728,1,1,e5ad593eb57d8f8ad2050c6d2221fdea3c5f1858d0679a0cebdd6d2797dcd4ac,2024-09-05T17:44:56.007000 +CVE-2024-44727,0,1,432a45bb69a6ce805e19134aadc7dd1c7ca3326f801d7e7b2e82b3ea3cac52a9,2024-09-05T18:35:07.867000 +CVE-2024-44728,0,1,e7feaf4ca9b4eceb9eabb25aa76aff961f32b33e63d3b4022190eae15ef212ad,2024-09-05T18:35:09.257000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 @@ -258860,9 +258861,9 @@ CVE-2024-44778,0,0,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d CVE-2024-44779,0,0,8defc64818470b86a1ed4aeff7b1d178fe09f0b4135b6d31847cdbae6f118693,2024-09-03T18:33:51.297000 CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000 CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000 -CVE-2024-44793,0,0,2168e0c02c7a858cbaff9cee44bb5e6a195abfb08b3b31876bea7f6d43977fff,2024-08-27T13:02:05.683000 -CVE-2024-44794,0,0,11eeb67a7b853f1bc22c93c4e0ddf7e4d6c299bfd8e0ef5c1bd1a86a955e3ef9,2024-08-27T14:35:08.947000 -CVE-2024-44795,0,0,f9348c862b893d90addc6562eec87c7c0ce5090e93e9e7ffbd3fc77a1c96e860,2024-08-27T13:02:05.683000 +CVE-2024-44793,0,1,475809f13ca115bedace2b70621dd1b06c8befeab10468b4f5b0fa1c27241f87,2024-09-05T18:28:42.687000 +CVE-2024-44794,0,1,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239fc4,2024-09-05T18:28:09.247000 +CVE-2024-44795,0,1,2459dd83721718e1502976fd61ac15b289981ba6005e92e7c41d33d2e6b740f8,2024-09-05T18:26:41.490000 CVE-2024-44796,0,0,ea2f83fd317230dba37a019c6df79333d03496931fcac69fc846f82ae10f3010,2024-08-27T13:02:05.683000 CVE-2024-44797,0,0,7bc801096aef27df0c5244f5a3c761f34dc19dd9fff98d1b382da189467f2dbf,2024-08-27T15:35:18.880000 CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000 @@ -258896,12 +258897,12 @@ CVE-2024-44920,0,0,12f1b6eb8fb8d99f08a0b224eeeb570d2ee08178391a3e25e8980965db9b7 CVE-2024-44921,0,0,b581e2c2532137589de006c20122d6cbe14e56f4b907946bd0416f760b5174f5,2024-09-04T15:00:15.103000 CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000 CVE-2024-44930,0,0,81ff02371a55a44df0a682ce0b18f3f2c62d0a039ce7ca02ce228b72e51fdea1,2024-09-04T19:35:13.800000 -CVE-2024-44931,0,1,fedd8ff9b4ae1a6a2e15976a48c1769aa25628bd9ca3ea3eb582f8cceef9ddec,2024-09-05T17:58:45.847000 +CVE-2024-44931,0,0,fedd8ff9b4ae1a6a2e15976a48c1769aa25628bd9ca3ea3eb582f8cceef9ddec,2024-09-05T17:58:45.847000 CVE-2024-44932,0,0,34330dfb165e1fba6e46b58c01253474b02f0143013b4d7b232046de617ca50b,2024-08-27T16:08:45.020000 CVE-2024-44933,0,0,4b8d6d8796496a10942df74ea36b0343a95a4c8e561f02a6a6cf79113627fbd2,2024-08-27T16:08:38.973000 CVE-2024-44934,0,0,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0bc4,2024-08-27T16:07:58.727000 CVE-2024-44935,0,0,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000 -CVE-2024-44936,0,1,f9815d599f28fad94981996d900e9d02a0d2f13fbfa06d4ba10d6ebc83ea02d0,2024-09-05T17:53:43.867000 +CVE-2024-44936,0,0,f9815d599f28fad94981996d900e9d02a0d2f13fbfa06d4ba10d6ebc83ea02d0,2024-09-05T17:53:43.867000 CVE-2024-44937,0,0,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000 CVE-2024-44938,0,0,78c7eb7f4b70b2193d6a764b661f1c4b34c66de744f08d6fe3e652c84bf9ba47,2024-08-29T17:15:08.753000 CVE-2024-44939,0,0,77e340056998b85a0edb6eda2bb5776e7eba0084412d6173fbb841dbdf80b07a,2024-08-29T17:15:08.837000 @@ -258940,10 +258941,10 @@ CVE-2024-44968,0,0,125d9977c95cd27fad067d65cfceb4b033cca732bc912f36769ab80d59342 CVE-2024-44969,0,0,66b82aa80b6cd92846532cef33b442d38baf22d6911e941514910b3c6f435cd4,2024-09-05T12:53:21.110000 CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000 CVE-2024-44970,0,0,70414797c7f1420a60b48e34277f5530ec1aa67aed6a07d8d2aaeded9223b4e0,2024-09-05T12:53:21.110000 -CVE-2024-44971,0,1,44403d9889954211cee528d64ed0dc86351f6fa04277308e5630c2d58c6cab86,2024-09-05T17:54:36.607000 +CVE-2024-44971,0,0,44403d9889954211cee528d64ed0dc86351f6fa04277308e5630c2d58c6cab86,2024-09-05T17:54:36.607000 CVE-2024-44972,0,0,0b967112ef26e3fe5b0935b427f88208867173c88daf36aa5bd2c336c4f07e64,2024-09-05T12:53:21.110000 CVE-2024-44973,0,0,add414a58e878f3aee3366f7678bfde348bdae69c48419c508ba030f370d1ae1,2024-09-05T12:53:21.110000 -CVE-2024-44974,0,1,d30d58207e6dfca8da341794aff27a7e2b32517cb9fbd6823ea9a20a4528e0d8,2024-09-05T17:54:29.037000 +CVE-2024-44974,0,0,d30d58207e6dfca8da341794aff27a7e2b32517cb9fbd6823ea9a20a4528e0d8,2024-09-05T17:54:29.037000 CVE-2024-44975,0,0,012dcb6db335aa97afa1ef9268f931ab68a445b973fc3f10a7843af27070943c,2024-09-05T12:53:21.110000 CVE-2024-44976,0,0,8c7b930f69a8eac68da6855eedc8b3a97b1051cdf631749b93c2aaf1d2a28ef8,2024-09-05T12:53:21.110000 CVE-2024-44977,0,0,8267c668040f19c89ab2180e788476dee75d30c69bd18b77721b380cd5039fc4,2024-09-05T12:53:21.110000 @@ -258951,13 +258952,13 @@ CVE-2024-44978,0,0,750dfff7f3690d54d4412faa52af936afcd2098a8aaeee06d2a7378cfc77e CVE-2024-44979,0,0,c564230a8b2dad8ceef7ebf62fdc806efd7fe79c5ccf1d638e23d29d49c547ed,2024-09-05T12:53:21.110000 CVE-2024-4498,0,0,237405bb434f57b5ee3d93725ee504cc093cf6521d831301400a29eebde53ae2,2024-06-26T12:44:29.693000 CVE-2024-44980,0,0,47cbb2b80b64a9e65a634f164af37fe8f9bbf35b2a4763627fcb954d1d43d5f1,2024-09-05T12:53:21.110000 -CVE-2024-44981,0,1,bc3bb172f7a0023a22356964618a5541429c999634289482e09bbe39c56b8053,2024-09-05T17:54:19.377000 +CVE-2024-44981,0,0,bc3bb172f7a0023a22356964618a5541429c999634289482e09bbe39c56b8053,2024-09-05T17:54:19.377000 CVE-2024-44982,0,0,097b402de9531ebf5ca1f6aae63ba13bda02a74939ff8ca55ac9e7a6db69946f,2024-09-05T12:53:21.110000 CVE-2024-44983,0,0,690629c42f711182358e1764655aca93c3a6bdc31e0702c9218202b7b3762339,2024-09-05T12:53:21.110000 CVE-2024-44984,0,0,c055413ce64b83c18979ac6480bb0a27c5e68feb3d290ff4c7ff28dc7f6a5b89,2024-09-05T12:53:21.110000 -CVE-2024-44985,0,1,89614f0dc5a1bc1e42d274d3ec6531500905f54e1226dc3d0cfa558fdaf45e82,2024-09-05T17:54:11.313000 -CVE-2024-44986,0,1,7b1b7f962a5dde2e3112c86530d9327efd0060e0a73a92ec7225981af2f022b4,2024-09-05T17:54:04.127000 -CVE-2024-44987,0,1,80c7ee92eb0c64e1bc51cb1cea659b21d515983723260d3a4a67be7790dea749,2024-09-05T17:53:54.687000 +CVE-2024-44985,0,0,89614f0dc5a1bc1e42d274d3ec6531500905f54e1226dc3d0cfa558fdaf45e82,2024-09-05T17:54:11.313000 +CVE-2024-44986,0,0,7b1b7f962a5dde2e3112c86530d9327efd0060e0a73a92ec7225981af2f022b4,2024-09-05T17:54:04.127000 +CVE-2024-44987,0,0,80c7ee92eb0c64e1bc51cb1cea659b21d515983723260d3a4a67be7790dea749,2024-09-05T17:53:54.687000 CVE-2024-44988,0,0,88c9242491758cb5cb40dacc794baa4f1069a31af76a02349607187c0ed57054,2024-09-05T12:53:21.110000 CVE-2024-44989,0,0,66cb11edf9d1909542342085f72a5573b26127c4e7900cbcb71ee304cabd5de7,2024-09-05T12:53:21.110000 CVE-2024-4499,0,0,570303fc4016a4dd92480bffd8c28af92c74f4e1e3602b750ed7335c1012dd3c,2024-06-24T12:57:36.513000 @@ -259011,9 +259012,9 @@ CVE-2024-45075,0,0,970063a21cc69312ed5905047a4f8f95237496df40f08985a6b50e18ab5ad CVE-2024-45076,0,0,0d010c89a424f0e84ebaa9873d815dffe8bb1375c669731f5cae4948fe4c87e7,2024-09-05T12:53:21.110000 CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000 CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c545588,2024-06-04T19:20:40.347000 -CVE-2024-45096,1,1,aefd09806b336e2caaa00d3cc13f091974b030964f04a96dfe32ea746427b842,2024-09-05T17:44:56.007000 -CVE-2024-45097,1,1,d534536acedfcf8d566d2118b26f8511c001022f1401d52b72be23dbc0714685,2024-09-05T17:44:56.007000 -CVE-2024-45098,1,1,8a18f22e4607fe5f99e79577abcbf75e27fc6f0e2998a1be4745f780b866a16b,2024-09-05T17:44:56.007000 +CVE-2024-45096,0,0,aefd09806b336e2caaa00d3cc13f091974b030964f04a96dfe32ea746427b842,2024-09-05T17:44:56.007000 +CVE-2024-45097,0,0,d534536acedfcf8d566d2118b26f8511c001022f1401d52b72be23dbc0714685,2024-09-05T17:44:56.007000 +CVE-2024-45098,0,0,8a18f22e4607fe5f99e79577abcbf75e27fc6f0e2998a1be4745f780b866a16b,2024-09-05T17:44:56.007000 CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000 CVE-2024-45107,0,0,5e2ac9906d55f0e5240ab60036468d760c6dd02ed6b1d647a490b90389e8644b,2024-09-05T12:53:21.110000 CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3d1,2024-06-04T19:20:40.443000 @@ -259021,6 +259022,9 @@ CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb5 CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 +CVE-2024-45157,1,1,ce21286ebccfda40d419c9da81f47504cf2b71234a4dee900faff3a1d9b1f868,2024-09-05T19:15:12.960000 +CVE-2024-45158,1,1,ef2a05d131019ffc3e25e05334881d1c39c7b5bc6d5bf6b35a5f0a78fb5b3cbd,2024-09-05T19:15:13.057000 +CVE-2024-45159,1,1,82722b01bc08879ccd93dc8cfd7f3f41f3ee5444ab5acbf1289516725b4844cb,2024-09-05T19:15:13.150000 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 @@ -259030,14 +259034,14 @@ CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0 CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000 CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000 CVE-2024-45170,0,0,8fe4b9ac86882f3df66af526948de512a679162d1d237b054f8ec9bd99499824,2024-09-05T12:53:21.110000 -CVE-2024-45171,1,1,aa9262ec591f67c9e699cd3bc0e4bbae747ed0a50d00a5f403b06f8a9adb7261,2024-09-05T17:44:56.007000 +CVE-2024-45171,0,1,44764c2b40f15089c93233a3fd2f8ca9bfb540498eb596e48276b933392860b5,2024-09-05T18:35:10.600000 CVE-2024-45172,0,0,68b3dace475f9bcf51f79da5da4aa2b3c04841de6dc44424481c2470782012ce,2024-09-05T12:53:21.110000 -CVE-2024-45173,0,1,acc511e53cc2bafc7488cc4a9e5e621e07dca55234855cf7c1f473f527f2b903,2024-09-05T17:44:56.007000 +CVE-2024-45173,0,1,88d9373a72a49c2a06d510c768062270db0525ab65bed78a0cef4da908105550,2024-09-05T18:35:11.413000 CVE-2024-45174,0,0,2ba63c333cfe37e6c7dca9f72909d21c7893acb52b292b0e6cf7a4a15b777141,2024-09-05T12:53:21.110000 -CVE-2024-45175,1,1,ddc8b1aab13e99a4881a398b18dd58a8ecf970f7ec51023c0c4d80cab7d33da5,2024-09-05T17:44:56.007000 -CVE-2024-45176,1,1,9e73e17f2400f9bdfca790d758456123eeb89e9be09d282f0b477b1245f7890f,2024-09-05T17:44:56.007000 +CVE-2024-45175,0,1,5fe5b22f26e28d66be59c0251d3e963c92d3558d0a77502f4f2514277df45094,2024-09-05T18:35:12.220000 +CVE-2024-45176,0,0,9e73e17f2400f9bdfca790d758456123eeb89e9be09d282f0b477b1245f7890f,2024-09-05T17:44:56.007000 CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000 -CVE-2024-45178,0,1,77e586d9f02b3ffe2b74a389a48d41c9b2c2fdb379ac71b90c85072739a0a732,2024-09-05T17:44:56.007000 +CVE-2024-45178,0,0,77e586d9f02b3ffe2b74a389a48d41c9b2c2fdb379ac71b90c85072739a0a732,2024-09-05T17:44:56.007000 CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000 CVE-2024-45180,0,0,972956c14c3744d5d70c795422903443a3c866a60353a62faa079ebc718a4b11,2024-09-04T13:05:36.067000 CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000 @@ -259048,7 +259052,7 @@ CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943 CVE-2024-45191,0,0,8410bc983e36e5828d4c81d5e10811b72eb1342d768b1b1249b7ba20875ec3a3,2024-09-01T22:15:13.697000 CVE-2024-45192,0,0,5da4aeb150ce1f250e3c04f3741f974ba0c69f3ea24005aed7598a0020d8fabe,2024-09-01T22:15:13.880000 CVE-2024-45193,0,0,1554745324792bf9e818f523be327d3eb138b0a7e9f93b1f1c9abf081b45aade,2024-09-01T22:15:13.943000 -CVE-2024-45195,0,1,34c5e59a697b1b18d598c708f966cb61644746f7a7560c269f56903739b49916,2024-09-05T17:44:25.040000 +CVE-2024-45195,0,0,34c5e59a697b1b18d598c708f966cb61644746f7a7560c269f56903739b49916,2024-09-05T17:44:25.040000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 @@ -259071,7 +259075,7 @@ CVE-2024-45256,0,0,4a4b83adefef92d16e6e4183f85729c0b386c1024d8d0fd2baaf64a1cf554 CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000 CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000 CVE-2024-45264,0,0,822145f9a1da648532bc7a1b41e14edccb94fd2d8996f04c204c8fc97c8f117a,2024-08-30T15:02:34.610000 -CVE-2024-45265,0,0,32b1057978cea9d5f5845b9f4e3926bb7432d8755213d6bbe9f6e3c948032919,2024-08-27T14:35:12.220000 +CVE-2024-45265,0,1,0bfdc3ea11a3a8b692c725170390e0ed5e5bfa861ba7586668c7c78868fd4e58,2024-09-05T18:30:23.883000 CVE-2024-45269,0,0,930c2dda66909b7393cc3daf8d8e0bcb8066c589d45124dd784354d0c2c32ffd,2024-09-04T11:49:36.950000 CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000 CVE-2024-45270,0,0,c7af37af49333c30529c68858eecc171381f5cb95414149d25997e187a81c107,2024-09-04T11:51:30.887000 @@ -259106,11 +259110,12 @@ CVE-2024-45389,0,0,9f0fa9283a2a5f874fd0dba70c8232c3ec84e221a6ccb67b23537b0164ce9 CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000 CVE-2024-45390,0,0,332342778ea7f712e3a75a5f422837c59f0b8fc1cd3d7840f34f23531141c0dc,2024-09-04T13:05:36.067000 CVE-2024-45391,0,0,9c5789b02ec0149b6dd4c299f7c2076a4f5ab5f425e6ba50511de158538b434d,2024-09-04T13:05:36.067000 -CVE-2024-45392,1,1,af416bc436367ecd17d4327e2c9724f545247e3dec23ef3d729c2f2318a24710,2024-09-05T17:44:56.007000 +CVE-2024-45392,0,0,af416bc436367ecd17d4327e2c9724f545247e3dec23ef3d729c2f2318a24710,2024-09-05T17:44:56.007000 CVE-2024-45394,0,0,2ba0026e07469dbf430ebd158b45587c8559adbe0d6d259ad77063b3124f324c,2024-09-04T13:05:36.067000 CVE-2024-45395,0,0,e86751a06dbfe92039318153ae3e40334cccb8072cf74037173dfdb8955c4b2b,2024-09-05T12:53:21.110000 CVE-2024-45399,0,0,a1cf7f5ebf189fb42f167aadd6e82f696503abfd38953cb1d8591d5d8cf1b025,2024-09-05T12:53:21.110000 CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000 +CVE-2024-45401,1,1,3c88df195b7bc9bef10d44341cd82c495fdc28256bad028f6bf60935301e4602,2024-09-05T18:15:06.227000 CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000 @@ -259139,7 +259144,7 @@ CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000 CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000 CVE-2024-45506,0,0,f825d7097befd0ec70ad07a8a6b4c2f13762a67e5f358f9d2ab15de2e8f395af,2024-09-05T14:39:49.807000 -CVE-2024-45507,0,1,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c17c4,2024-09-05T17:53:39.760000 +CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c17c4,2024-09-05T17:53:39.760000 CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000 CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000 CVE-2024-4551,0,0,5eadeaa2a7f21f0b3297f45277617c137a52e984170b931f9145e745d378c040,2024-06-17T12:42:04.623000 @@ -259156,7 +259161,7 @@ CVE-2024-4558,0,0,f33120bad100499bf0c3c5e20b119cff8d6ade1c8324fe8cac904ff1ff2e14 CVE-2024-45586,0,0,e206a9f9f52d6df31e8745674bc07b4799319b79462f9d7a84cd2e9a2bd105dc,2024-09-04T12:15:05.320000 CVE-2024-45587,0,0,0131eba1114d110e01e395a66f8c68816d231f10bed8e8f9e00161c4edaf0484,2024-09-04T12:15:05.530000 CVE-2024-45588,0,0,7fb04f846e0d14b9a2876b98b70ef6e3701ca14d55fb8c54290d798cd0a7dd22,2024-09-04T12:15:05.673000 -CVE-2024-45589,1,1,41abacedcfdd00ab4b5a0216e0ff43c3500515b41f98e551b04e2144d0f36672,2024-09-05T17:44:56.007000 +CVE-2024-45589,0,1,930b9e7d1049de5fd77c118aec6aec43fbcdbc28904837c90af89d35a5b4c62f,2024-09-05T18:35:13.200000 CVE-2024-4559,0,0,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa04589,2024-07-03T02:07:46.003000 CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 @@ -259614,7 +259619,7 @@ CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 -CVE-2024-5067,0,1,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 +CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,785631f9585d5c4be650f1d6b68cd50ecc66584beb25a8693cb2019c0e550973,2024-06-26T12:44:29.693000 CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000 @@ -260531,7 +260536,7 @@ CVE-2024-6144,0,0,34fdda404a75a4c4d6599bec7541c145a061f61832fb3538fd14d272d1558c CVE-2024-6145,0,0,0767033006dde7f1e31949fe9ea410ea11be731c165d491f81ceb3f3403cdf19,2024-06-20T12:44:01.637000 CVE-2024-6146,0,0,0c77daedfbd4e49c0eeb90a8aaa7aad7729663e49a90d6bbd8f152a780888f21,2024-06-20T12:44:01.637000 CVE-2024-6147,0,0,f7966fe4963078c94cc06d4ad1659f2089dae235f15bb89901bea1c6d027f9fd,2024-06-21T11:22:01.687000 -CVE-2024-6148,0,1,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000 +CVE-2024-6148,0,0,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000 CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000 CVE-2024-6150,0,0,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000 CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d73f,2024-08-01T14:00:12.180000 @@ -260759,8 +260764,8 @@ CVE-2024-6417,0,0,6e48cdc342303ad3979da22d973620652c6e86e6096b57c31f35e162cd788f CVE-2024-6418,0,0,3726fd1702ff9a949688831dda28151bc049d46e9dc8f8e1694335dadae342a2,2024-08-15T17:18:04.637000 CVE-2024-6419,0,0,d1125fdea940518955d1a32cee03991a6482ba7897a625dcd2db437f7c0a164f,2024-08-15T17:18:53.077000 CVE-2024-6420,0,0,7f0d40c7ab5728df02346c9cfb247ebee6aa204ac7d8c9979e31822e624cbe16,2024-08-01T14:00:22.580000 -CVE-2024-6421,0,0,98b5319ebdc67a3a8de540a977d3424c9b227b8694c1c8da93e49a4ad86f1bd5,2024-07-11T13:05:54.930000 -CVE-2024-6422,0,0,e1aac1f04e50002f6adeb7613d16ec85ba239decc5dbe8b4da8a4789edaa7f18,2024-07-11T13:05:54.930000 +CVE-2024-6421,0,1,251fc2e5f4710a88710918e44e27a09768d922303e8d2da0cf9a1a4f75677948,2024-09-05T18:11:43.297000 +CVE-2024-6422,0,1,f46904cabedd99888bea218707c8704c649eeda309670532a2a6728cde146bcb,2024-09-05T18:20:31.983000 CVE-2024-6424,0,0,a4271c75a6c97806333e2d8d45edb2537cf0684790d84aeb8788fc5848fb2e64,2024-07-01T16:37:39.040000 CVE-2024-6425,0,0,1981db7e64cdcda541cd3fd376e4579d515a61b711b4c458d916795af9b7e4f2,2024-07-01T16:37:39.040000 CVE-2024-6426,0,0,f8400a1dd26a0192767404ca5f7752c12cf287ce03e2990002fc305f7bc08efa,2024-07-05T17:10:26.683000 @@ -261117,9 +261122,9 @@ CVE-2024-6941,0,0,955595fb76450a1a62e813d4c45133328a8676f5ccb18fb825b649a76bb01c CVE-2024-6942,0,0,f1725fdd1399ca72ea0b8d2f93c5340e502f9438fb6787b344812a3c8e0bd515,2024-07-22T13:00:31.330000 CVE-2024-6943,0,0,7309c2d9079ce590094e11ba25e488d6ae9c04f61c2a745c926407505228412a,2024-07-22T13:00:31.330000 CVE-2024-6944,0,0,7b965a61c0ec04909ebf3b2d64fc3cac19dfdf0980bcfd6393e8e0769c3fc723,2024-07-22T13:00:31.330000 -CVE-2024-6945,0,1,fe7643eb8a7b51df3743099b1ad67c8dd1ce3b9c85ea5a20c342990508ec4fba,2024-09-05T16:14:31.237000 -CVE-2024-6946,0,1,df228dd2d7200de27b517d29f9641805aeb6beb3f4080f036d115266cf455158,2024-09-05T16:14:28.857000 -CVE-2024-6947,0,1,d9680f8f56c52ed66ccf8eaad5c9080a87e7a6242d8c371c2239db66f7a5aa2b,2024-09-05T16:14:25.513000 +CVE-2024-6945,0,0,fe7643eb8a7b51df3743099b1ad67c8dd1ce3b9c85ea5a20c342990508ec4fba,2024-09-05T16:14:31.237000 +CVE-2024-6946,0,0,df228dd2d7200de27b517d29f9641805aeb6beb3f4080f036d115266cf455158,2024-09-05T16:14:28.857000 +CVE-2024-6947,0,0,d9680f8f56c52ed66ccf8eaad5c9080a87e7a6242d8c371c2239db66f7a5aa2b,2024-09-05T16:14:25.513000 CVE-2024-6948,0,0,0b9fbb236c6e3f5ea21d1e35e20ae66f7f191a5cc171b7ef9247f18011e040b5,2024-07-22T13:00:31.330000 CVE-2024-6949,0,0,50fb9ada1c84c7692d0a258888bcfbeb043b4a29416a40cdc9f5aa2aa0edc74b,2024-07-22T13:00:31.330000 CVE-2024-6950,0,0,eef15633338af4a4d46f21c9ea1976ad7775894e17137260e2d107902fc3b3ff,2024-07-22T13:00:31.330000 @@ -261183,8 +261188,8 @@ CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ff CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830add6,2024-08-20T15:44:20.567000 CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000 -CVE-2024-7057,0,1,a6551db1efaa6d27001f0a9bd261718973ddbbed12b7a664704cb76182efd9f6,2024-09-05T17:33:21.630000 -CVE-2024-7060,0,1,99f05c9e70d96dfd810da0f220a22b8ca1f2d257118941ef3fe99789faa8dacc,2024-09-05T17:30:34.897000 +CVE-2024-7057,0,0,a6551db1efaa6d27001f0a9bd261718973ddbbed12b7a664704cb76182efd9f6,2024-09-05T17:33:21.630000 +CVE-2024-7060,0,0,99f05c9e70d96dfd810da0f220a22b8ca1f2d257118941ef3fe99789faa8dacc,2024-09-05T17:30:34.897000 CVE-2024-7061,0,0,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000 CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000 CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000 @@ -261204,7 +261209,7 @@ CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb CVE-2024-7082,0,0,7f537cf9e56a23a456a2abd974bf40cbc8fb8378373545e42b0269e937581d9d,2024-08-06T16:30:24.547000 CVE-2024-7084,0,0,3a2aa9dec6c248febe470c8d1edface773b4a9804761de6b43694a8997eff852,2024-08-06T16:30:24.547000 CVE-2024-7090,0,0,3d2aabad43a36db418269bf4caffe0ea33f51a81aff1bd4a0b06249046f5e156,2024-08-21T12:30:33.697000 -CVE-2024-7091,0,1,068f40b9775b7a1af5c1f8fd253806f6c329a370c68d78b52ba455d7a8a57314,2024-09-05T17:32:20.553000 +CVE-2024-7091,0,0,068f40b9775b7a1af5c1f8fd253806f6c329a370c68d78b52ba455d7a8a57314,2024-09-05T17:32:20.553000 CVE-2024-7092,0,0,e9e7e1c22eeddb38238cff178e26d1e84cd16a1ecd7c31190a29d77a32325d08,2024-08-13T12:58:25.437000 CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000 CVE-2024-7094,0,0,d8ce6991dc787cf1fc8f383d7f348b0cc8c833a282f09c60355b50a58a302aa6,2024-08-13T12:58:25.437000 @@ -261434,7 +261439,7 @@ CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000 CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000 CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000 -CVE-2024-7401,0,0,9083ffa03061518a1df9bde16741130e36a2134311b43b7dec2fcdc770c95021,2024-08-28T06:15:06.320000 +CVE-2024-7401,0,1,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,fe0e27b90db802bc9518336b034685fa4c799cf8d0788ebbf26f89b44bf0ec6f,2024-08-06T16:31:05.780000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 @@ -261563,6 +261568,7 @@ CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e6 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 +CVE-2024-7591,1,1,139e2e9b0c25d798d9d202466997cefcfb88cf9d67a1d574438c4328868aa9a7,2024-09-05T18:15:06.480000 CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000 CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000 CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000 @@ -261707,7 +261713,7 @@ CVE-2024-7830,0,0,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f CVE-2024-7831,0,0,eb69cd4a0800be9661e71c87c21be96f36edebb1b6acd7d144479ba831d4e240,2024-08-19T18:35:25.813000 CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7ef,2024-08-19T16:02:17.383000 CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000 -CVE-2024-7834,0,1,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000 +CVE-2024-7834,0,0,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000 CVE-2024-7836,0,0,7f956604655d7e703b4d07ab139348e9fe93ea32a8fc5e7f3d323a6d1a3366d7,2024-08-22T12:48:02.790000 CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000 CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 @@ -261731,7 +261737,7 @@ CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000 CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000 CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000 -CVE-2024-7884,0,1,c6af974e27eca5f26a6a3dbae74174709521379e7c4b14b7d417db95dd9f1e61,2024-09-05T17:45:07.877000 +CVE-2024-7884,0,0,c6af974e27eca5f26a6a3dbae74174709521379e7c4b14b7d417db95dd9f1e61,2024-09-05T17:45:07.877000 CVE-2024-7885,0,0,53926a53ab4f71fc31c04b79b6d61e8c39bb180f373c05a721578db45aa87a6a,2024-08-23T17:05:24.343000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 @@ -261897,7 +261903,7 @@ CVE-2024-8169,0,0,2fe56196262642c44aec8bafd52bbf787b8c04f89d2046b461b5203375e755 CVE-2024-8170,0,0,e7028e0b405dbb20fdca4f12f7f80cdc8739f22dd67ad43d2100093929ab7ccd,2024-08-27T16:02:50.577000 CVE-2024-8171,0,0,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ada6,2024-08-27T16:02:19.150000 CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000 -CVE-2024-8173,0,0,df3f4daf54afccb31b2d0dbd1ade86a4fd2b61ea5ed1b3d3f6de3c93aae29da5,2024-08-26T19:10:09.607000 +CVE-2024-8173,0,1,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd83c,2024-09-05T18:39:00.950000 CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 CVE-2024-8178,0,0,1e525d66d46c62c5224b39cc215fb855e21064ea1da98f04df28728fccdf2cd7,2024-09-05T12:53:21.110000 CVE-2024-8181,0,0,3c630c74e0a5e892a66667409ec22f499f363f5b25e34ef38a41031abbd935c0,2024-09-04T12:15:05.833000 @@ -261943,7 +261949,7 @@ CVE-2024-8260,0,0,80de48284b9b1f60542ccd162f62ac34372df44b6034ef82705622d907f322 CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000 CVE-2024-8276,0,0,6d091b531458424cc4635f6e051f410dabbe91d1101fd761130b66815a93f34d,2024-09-03T12:59:02.453000 CVE-2024-8285,0,0,3b0be068594bf7034dac9ef4fa68f5d83c55fdc692ee8082bd0a6e0eca73c78a,2024-09-03T12:59:02.453000 -CVE-2024-8289,0,1,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000 +CVE-2024-8289,0,0,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000 CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000 CVE-2024-8295,0,0,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000 CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000 @@ -262005,24 +262011,24 @@ CVE-2024-8409,0,0,9f46c5adb31a6d87824a8eab48e9d2e947ae9b31368ae468d358816a64d27b CVE-2024-8410,0,0,2e5ace471a9894647ef29b6ebd87c70c70869b886444866dda4ae993cd050d69,2024-09-05T14:20:08.100000 CVE-2024-8411,0,0,b4f7e89f5a480939e3a01a132dc8fe8e09d6e0d2ced62a743c053df55b7374b3,2024-09-05T14:19:38.377000 CVE-2024-8412,0,0,d0351d4c1c74894581bf0ef5deff245493bcbfdb0a46fd49491e896953e0c3d1,2024-09-05T12:53:21.110000 -CVE-2024-8413,0,1,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a785425,2024-09-05T17:40:36.953000 +CVE-2024-8413,0,0,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a785425,2024-09-05T17:40:36.953000 CVE-2024-8414,0,0,c7a278942d1133117f185ab4b3c94fa3f349e952cb00264f39f6a8b179d4c200,2024-09-05T12:53:21.110000 CVE-2024-8415,0,0,d8c5585e64bc4323fcda510a16df97bcb1ec11253c5d38c080bb7195e38687ce,2024-09-05T12:53:21.110000 CVE-2024-8416,0,0,c7d13bc001a0210b2e719e08e8651ac5ae2e4ed0ee9e6e0088ac4a7e467de1ca,2024-09-05T12:53:21.110000 CVE-2024-8417,0,0,a9619e26c595954087d9c9b458e78703071fbd5bf87ff4a22ec6d8ecc7076fcb,2024-09-05T12:53:21.110000 CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000 -CVE-2024-8445,0,1,11be885f11a2f2b8a202932b0e16edeb442a7212afe3a0c8e195900656f3fddf,2024-09-05T17:44:56.007000 +CVE-2024-8445,0,0,11be885f11a2f2b8a202932b0e16edeb442a7212afe3a0c8e195900656f3fddf,2024-09-05T17:44:56.007000 CVE-2024-8460,0,0,9f3f8eceb3112773f2710cd04ce3ea02c4b8eea37add051a54caa5d3f11f68a4,2024-09-05T12:53:21.110000 -CVE-2024-8461,0,1,e49804a708251a77ac276dc2c87288b6f990bf8f9a9704c388f55d96a1de96d3,2024-09-05T17:45:07.877000 -CVE-2024-8462,0,1,8682862ce3f64006ead2b5107e241d40db31c5fa4d83c6d6ef7e924f1f4b5669,2024-09-05T17:45:07.877000 -CVE-2024-8463,0,1,f4cdf675d6b0eb7f01f77f31a8fd89b2a766f7cce7cb1cccf094868a09c458d5,2024-09-05T17:45:07.877000 -CVE-2024-8464,0,1,61ce8b9aed9baba98076045261c954dba5e25afc32dc472de46bd5181f0cb734,2024-09-05T17:45:07.877000 -CVE-2024-8465,0,1,aff88c1afcbcfb60feafc34cce7db2da4e688f46ce323be409462c7eba39283a,2024-09-05T17:45:07.877000 -CVE-2024-8466,0,1,3295994b36f5ce6fc39e587e9c4c3775f816ee9866be04c460f4bdcc29954e72,2024-09-05T17:45:07.877000 -CVE-2024-8467,0,1,d1b32b2a2420547f04666abaf7f537c271c50cbdb68eb44a40d173c98f7f1391,2024-09-05T17:45:07.877000 -CVE-2024-8468,0,1,e00a5e0503157cf890dafde0af92a6974faaa85216cb0f8d41e020ff1173f90d,2024-09-05T17:45:07.877000 -CVE-2024-8469,0,1,11c4fcf92a7eb7d5edf52263fc218194cae4f062ee6648d86209831687f49fa8,2024-09-05T17:45:07.877000 -CVE-2024-8470,0,1,956507eff563dfb5dc2d763a7fe06da01a484a013fe76d06d998d5ee320dc85d,2024-09-05T17:45:07.877000 -CVE-2024-8471,0,1,f34bbd71761fef46adc756fc351feed22408fd26153f4113affb8a1936920967,2024-09-05T17:44:56.007000 -CVE-2024-8472,0,1,885bea6a62a60a6033a0ab44c8323d53a4e9fd268816a1f761f34f0327640851,2024-09-05T17:44:56.007000 -CVE-2024-8473,0,1,218b88700e46a6ed9b36b25211b02ba98a7bb737dcfbb815905fd6fc793977c1,2024-09-05T17:44:56.007000 +CVE-2024-8461,0,0,e49804a708251a77ac276dc2c87288b6f990bf8f9a9704c388f55d96a1de96d3,2024-09-05T17:45:07.877000 +CVE-2024-8462,0,0,8682862ce3f64006ead2b5107e241d40db31c5fa4d83c6d6ef7e924f1f4b5669,2024-09-05T17:45:07.877000 +CVE-2024-8463,0,0,f4cdf675d6b0eb7f01f77f31a8fd89b2a766f7cce7cb1cccf094868a09c458d5,2024-09-05T17:45:07.877000 +CVE-2024-8464,0,0,61ce8b9aed9baba98076045261c954dba5e25afc32dc472de46bd5181f0cb734,2024-09-05T17:45:07.877000 +CVE-2024-8465,0,0,aff88c1afcbcfb60feafc34cce7db2da4e688f46ce323be409462c7eba39283a,2024-09-05T17:45:07.877000 +CVE-2024-8466,0,0,3295994b36f5ce6fc39e587e9c4c3775f816ee9866be04c460f4bdcc29954e72,2024-09-05T17:45:07.877000 +CVE-2024-8467,0,0,d1b32b2a2420547f04666abaf7f537c271c50cbdb68eb44a40d173c98f7f1391,2024-09-05T17:45:07.877000 +CVE-2024-8468,0,0,e00a5e0503157cf890dafde0af92a6974faaa85216cb0f8d41e020ff1173f90d,2024-09-05T17:45:07.877000 +CVE-2024-8469,0,0,11c4fcf92a7eb7d5edf52263fc218194cae4f062ee6648d86209831687f49fa8,2024-09-05T17:45:07.877000 +CVE-2024-8470,0,0,956507eff563dfb5dc2d763a7fe06da01a484a013fe76d06d998d5ee320dc85d,2024-09-05T17:45:07.877000 +CVE-2024-8471,0,0,f34bbd71761fef46adc756fc351feed22408fd26153f4113affb8a1936920967,2024-09-05T17:44:56.007000 +CVE-2024-8472,0,0,885bea6a62a60a6033a0ab44c8323d53a4e9fd268816a1f761f34f0327640851,2024-09-05T17:44:56.007000 +CVE-2024-8473,0,0,218b88700e46a6ed9b36b25211b02ba98a7bb737dcfbb815905fd6fc793977c1,2024-09-05T17:44:56.007000